Skip to Content
Hands-On Red Team Tactics
book

Hands-On Red Team Tactics

by Himanshu Sharma, Harpreet Singh
September 2018
Intermediate to advanced
480 pages
9h 45m
English
Packt Publishing
Content preview from Hands-On Red Team Tactics

Persistence via Armitage

We have already covered this in previous chapters, but in this section we will look at some of the Windows exploitation scripts that allow us to achieve persistence on the victim host. We can look for all available exploits by searching for the keyword persistence in Armitage, as shown in the following screenshot. We can see that there are different exploits available that allow us to achieve persistence. Some of these are as follows:

  • Cron_persistence: This module will work on a *nix-based system and create a cron job that executes our payload.
  • Registery_persistence: This module creates a payload that is run either when a user logs on or on system startup, through the registry value in CurrentVersion\Run (depending ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Storytelling with You

Storytelling with You

Cole Nussbaumer Knaflic
The Manager's Path

The Manager's Path

Camille Fournier
Crucial Conversations

Crucial Conversations

Joseph Grenny, Kerry Patterson, Ron McMillan, Al Switzler, Emily Gregory

Publisher Resources

ISBN: 9781788995238Other