The Red Team Vade Mecum
Ctrlk
  • The Red Team Vade Mecum
  • Techniques
    • Defense Evasion
    • Privilege Escalation
    • Enumeration
    • Execution
    • Initial Access
    • Lateral Movement
    • Code Injection
    • Persistence
      • Scheduled Tasks
      • MS Office
      • SQL
      • Admin Level
        • SSP
        • Services
        • Default File Extension
        • AppCert DLLs
        • Time Provider
        • Waitfor
        • WinLogon
        • Netsh Dlls
        • RDP Backdoors
        • AppInit Dlls
        • Port Monitor
        • WMI Event Subscriptions
      • User Level
  • Infrastructure
    • SQL
  • Other
    • Vulnerability Discovery
    • Windows Internals
Powered by GitBook
On this page

Was this helpful?

  1. Techniques
  2. Persistence

Admin Level

SSPServicesDefault File ExtensionAppCert DLLsTime ProviderWaitforWinLogonNetsh DllsRDP BackdoorsAppInit DllsPort MonitorWMI Event Subscriptions
PreviousSQLNextSSP

Last updated 4 years ago

Was this helpful?