The Red Team Vade Mecum
search
⌘Ctrlk
The Red Team Vade Mecum
  • The Red Team Vade Mecum
  • Techniques
    • Defense Evasion
    • Privilege Escalation
    • Enumeration
    • Execution
    • Initial Access
    • Lateral Movement
    • Code Injection
    • Persistence
      • Scheduled Tasks
      • MS Office
      • SQL
      • Admin Level
        • SSP
        • Services
        • Default File Extension
        • AppCert DLLs
        • Time Provider
        • Waitfor
        • WinLogon
        • Netsh Dlls
        • RDP Backdoors
        • AppInit Dlls
        • Port Monitor
        • WMI Event Subscriptions
      • User Level
  • Infrastructure
    • SQL
  • Other
    • Vulnerability Discovery
    • Windows Internals
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Techniqueschevron-right
  2. Persistence

Admin Level

SSPchevron-rightServiceschevron-rightDefault File Extensionchevron-rightAppCert DLLschevron-rightTime Providerchevron-rightWaitforchevron-rightWinLogonchevron-rightNetsh Dllschevron-rightRDP Backdoorschevron-rightAppInit Dllschevron-rightPort Monitorchevron-rightWMI Event Subscriptionschevron-right
PreviousSQLchevron-leftNextSSPchevron-right

Last updated 4 years ago