The Red Team Vade Mecum
search
Ctrlk
  • The Red Team Vade Mecum
  • Techniques
    • Defense Evasionchevron-right
    • Privilege Escalationchevron-right
    • Enumerationchevron-right
    • Executionchevron-right
    • Initial Accesschevron-right
    • Lateral Movementchevron-right
    • Code Injectionchevron-right
    • Persistencechevron-right
      • Scheduled Taskschevron-right
      • MS Office
      • SQL
      • Admin Levelchevron-right
        • SSP
        • Services
        • Default File Extension
        • AppCert DLLs
        • Time Provider
        • Waitfor
        • WinLogon
        • Netsh Dlls
        • RDP Backdoors
        • AppInit Dlls
        • Port Monitor
        • WMI Event Subscriptions
      • User Levelchevron-right
  • Infrastructure
    • SQLchevron-right
  • Other
    • Vulnerability Discoverychevron-right
    • Windows Internalschevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Techniqueschevron-right
  2. Persistence

Admin Level

SSPchevron-rightServiceschevron-rightDefault File Extensionchevron-rightAppCert DLLschevron-rightTime Providerchevron-rightWaitforchevron-rightWinLogonchevron-rightNetsh Dllschevron-rightRDP Backdoorschevron-rightAppInit Dllschevron-rightPort Monitorchevron-rightWMI Event Subscriptionschevron-right
PreviousSQLchevron-leftNextSSPchevron-right

Last updated 4 years ago