Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)
-
Updated
Sep 15, 2022 - C++
Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)
Weaponizing for privileged file writes bugs with PrintNotify Service
Resources About Persistence, Multiple Platforms. Including ~80 Tools and 300+ Posts.
Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, ProjectSauron, APT29, EquationGroup, including Stuxnet / Flame.
This guide empowers non-tech Windows users to detect persistence threats, highlighting signs like cmd windows at startup, registry checks, and spotting malicious commands in PowerShell, cmd, rundll32, and wmic.
RatInject: C++ tool for stealthy Windows persistence via registry-based techniques.
Linux-persistence shows how to join user/pid/net/mnt/ipc/uts/cgroup namespaces via /proc/*/ns/* and setns(), unshare with UID/GID mapping, daemonize, beacon over 127.0.0.1:8443, optional self-delete. 🐙
This case study analyzed a low-complexity but real-world-relevant example of attacker persistence using the built-in Windows utility schtasks.exe.
A lightweight red team beacon with COM-based persistence and HTTP-based exfiltration.
Add a description, image, and links to the windows-persistence topic page so that developers can more easily learn about it.
To associate your repository with the windows-persistence topic, visit your repo's landing page and select "manage topics."