PwC安全技术小组
search
⌘Ctrlk
PwC安全技术小组
  • PwC安全技术小组须知
  • 技术
    • 技术 - Web安全测试技术点
    • 技术 - 安全开发知识库
    • 技术 - 红队攻击手段介绍
      • offensive-security-experiments
      • offensive-security
        • Red Team Infrastructure
        • Initial Access
        • Code Execution
        • Code & Process Injection
        • Defense Evasion
        • Enumeration and Discovery
        • Privilege Escalation
        • Credential Access & Dumping
        • Lateral Movement
        • Persistence
        • Exfiltration
      • miscellaneous-reversing-forensics
  • 工具
    • 工具 - BloodHound基础使用
    • 工具 - CobaltStrike基础使用
gitbook由 GitBook 提供支持
block-quote在本页chevron-down
  1. 技术chevron-right
  2. 技术 - 红队攻击手段介绍chevron-right
  3. offensive-security

Persistence

Here are the articles in this section:DLL Proxying for Persistencearrow-up-rightSchtaskCode execution, privilege escalation, lateral movement and persitence.arrow-up-rightService ExecutionCode Execution, Privilege Escalationarrow-up-rightSticky KeysSticky keys backdoor.arrow-up-rightCreate AccountPersistencearrow-up-rightAddMonitor()Persistence, Privilege Escalationarrow-up-rightNetSh Helper DLLPersistence, code execution using netsh helper arbitrary libraries.arrow-up-rightAbusing Windows Managent InstrumentationPersistence, Privilege Escalationarrow-up-rightHijacking Default File Extensionarrow-up-rightPersisting in svchost.exe with a Service DLLarrow-up-rightScreensaver HijackHijacking screensaver for persistence.arrow-up-rightApplication ShimmingPersistence, Privilege Escalationarrow-up-rightBITS JobsFile upload to the compromised system.arrow-up-rightCOM HijackingUAC Bypass/Defense Evasion, Persistencearrow-up-rightSIP & Trust Provider HijackingDefense Evasion, Persistence, Whitelisting Bypassarrow-up-rightHijacking Time ProvidersPersistencearrow-up-rightInstalling Root CertificateDefense Evasionarrow-up-rightPowershell Profile Persistencearrow-up-right

上一页Lateral Movementchevron-left下一页Exfiltrationchevron-right

最后更新于4年前

这有帮助吗?

这有帮助吗?