Persistence, Privilege Escalation, and Evasion
In this chapter, you will learn how to
• Use built-in operating system tools to further compromise environments
• Implement techniques for gaining persistence on your targets
• Leverage Windows privilege escalation techniques
• Identify ways of evading antivirus
In Chapter 4 you learned how pentesters can gain access to target devices by exploiting weaknesses in systems. As you’ll read in this chapter, once testers have gone through the trouble of gaining initial access via exploitation, they’ll want to make sure they do not lose that access. Regardless of whether you gain access to an endpoint device via phishing or to a server in a DMZ via command injection, for example, you ...