PwC安全技术小组
Ctrlk
  • PwC安全技术小组须知
  • 技术
    • 技术 - Web安全测试技术点
    • 技术 - 安全开发知识库
    • 技术 - 红队攻击手段介绍
      • offensive-security-experiments
      • offensive-security
        • Red Team Infrastructure
        • Initial Access
        • Code Execution
        • Code & Process Injection
        • Defense Evasion
        • Enumeration and Discovery
        • Privilege Escalation
        • Credential Access & Dumping
        • Lateral Movement
        • Persistence
        • Exfiltration
      • miscellaneous-reversing-forensics
  • 工具
    • 工具 - BloodHound基础使用
    • 工具 - CobaltStrike基础使用
由 GitBook 提供支持
在本页

这有帮助吗?

  1. 技术
  2. 技术 - 红队攻击手段介绍
  3. offensive-security

Persistence

Here are the articles in this section:DLL Proxying for PersistenceSchtaskCode execution, privilege escalation, lateral movement and persitence.Service ExecutionCode Execution, Privilege EscalationSticky KeysSticky keys backdoor.Create AccountPersistenceAddMonitor()Persistence, Privilege EscalationNetSh Helper DLLPersistence, code execution using netsh helper arbitrary libraries.Abusing Windows Managent InstrumentationPersistence, Privilege EscalationHijacking Default File ExtensionPersisting in svchost.exe with a Service DLLScreensaver HijackHijacking screensaver for persistence.Application ShimmingPersistence, Privilege EscalationBITS JobsFile upload to the compromised system.COM HijackingUAC Bypass/Defense Evasion, PersistenceSIP & Trust Provider HijackingDefense Evasion, Persistence, Whitelisting BypassHijacking Time ProvidersPersistenceInstalling Root CertificateDefense EvasionPowershell Profile Persistence

上一页Lateral Movement下一页Exfiltration

最后更新于4年前

这有帮助吗?