The Red Team Vade Mecum
Ctrlk
  • The Red Team Vade Mecum
  • Techniques
    • Defense Evasion
      • Binary Properties and Code Signing
      • ATA/ATP
      • Tips and Tricks
      • Basics
      • Disabling/Patching Telemetry
      • Minimization
      • Misdirection
        • Command Line Argument Spoofing
        • PPID Spoofing via CreateProcess
        • Switching Parents
          • Dechaining via WMI
      • Hiding our Payloads
      • IPC For Evasion and Control
    • Privilege Escalation
    • Enumeration
    • Execution
    • Initial Access
    • Lateral Movement
    • Code Injection
    • Persistence
  • Infrastructure
    • SQL
  • Other
    • Vulnerability Discovery
    • Windows Internals
Powered by GitBook
On this page
  1. Techniques
  2. Defense Evasion
  3. Misdirection

Switching Parents

Dechaining via WMI
PreviousPPID Spoofing via CreateProcessNextDechaining via WMI

Last updated 4 years ago

Was this helpful?

Was this helpful?