The Red Team Vade Mecum
Ctrlk
  • The Red Team Vade Mecum
  • Techniques
    • Defense Evasion
    • Privilege Escalation
    • Enumeration
    • Execution
    • Initial Access
    • Lateral Movement
    • Code Injection
    • Persistence
      • Scheduled Tasks
      • MS Office
      • SQL
      • Admin Level
        • SSP
        • Services
        • Default File Extension
        • AppCert DLLs
        • Time Provider
        • Waitfor
        • WinLogon
        • Netsh Dlls
        • RDP Backdoors
        • AppInit Dlls
        • Port Monitor
        • WMI Event Subscriptions
      • User Level
  • Infrastructure
    • SQL
  • Other
    • Vulnerability Discovery
    • Windows Internals
Powered by GitBook
On this page
  1. Techniques
  2. Persistence

Admin Level

SSPServicesDefault File ExtensionAppCert DLLsTime ProviderWaitforWinLogonNetsh DllsRDP BackdoorsAppInit DllsPort MonitorWMI Event Subscriptions
PreviousSQLNextSSP

Last updated 4 years ago

Was this helpful?

Was this helpful?