Persistence Mechanisms

Поділитися
Вставка
  • Опубліковано 6 вер 2024

КОМЕНТАРІ • 31

  • @doncorleone6182
    @doncorleone6182 6 років тому +13

    Thanks for keeping it free. God bless you.
    Will donate on patreon.

  • @carlsaiyed1097
    @carlsaiyed1097 6 років тому +2

    Great video, thank you for sharing.

  • @bairammamedov570
    @bairammamedov570 Рік тому +1

    Great Video , Thanks a lot

  • @sami9348
    @sami9348 6 років тому +1

    Great video, thanks Sir

  • @cyberkeshav
    @cyberkeshav Рік тому

    great explanation sir, but i have a question where i have to look for new persistence mechanism?

  • @dip9995
    @dip9995 Рік тому +2

    Does the evil.exe running example only work with notepad.exe?

    • @13Cubed
      @13Cubed  Рік тому +1

      No, that was just the example used.

  • @arreinsbeta
    @arreinsbeta 6 років тому +1

    Another hit

  • @monnombre6547
    @monnombre6547 3 роки тому +1

    thank you !!!!

  • @SecureTheWorld
    @SecureTheWorld 6 років тому

    Great video, thanks a lot 👍

  • @WebCreatorBrk
    @WebCreatorBrk 4 роки тому

    very cool!! but how i hook my win10 for hide process and netstat connections? send please

  • @minasalib1951
    @minasalib1951 Рік тому

    Would a hidden or deleted scheduled task show up in autoruns?

    • @13Cubed
      @13Cubed  Рік тому

      Deleted, no -- hidden, maybe -- depends on how it was hidden. See "The Case of the Disappearing Scheduled Task" episode.

  • @NoEgg4u
    @NoEgg4u 6 років тому

    I would like to be able to detect when anything new is added that will automatically start.
    The only solution I know of is to compare autorun results, from time to time.
    This, however, is too cumbersome, and is prone to human error, due to the number of items that are listed by autoruns (too difficult to identify new items).
    Is there a tool that can alert you whenever a new item is added? ...By that, I mean, any new item that Windows will run automatically.
    It would be great to be able to review every new item, and do so as soon as that item gets added to any auto-start part of Windows.
    Granted, it would not help with the Global Flags, Start Process Exit feature that is reviewed in this video. That aside, it would still be a great help to catch every new start-up item, and catch it right away.
    Thank you.

    • @13Cubed
      @13Cubed  6 років тому

      Good question -- not that I'm aware. Diffing Autoruns output would be my first thought as well, but you may be able to leverage Sysmon with some custom filters to accomplish this.

    • @NoEgg4u
      @NoEgg4u 6 років тому +2

      Greetings,
      Due to your area of expertise, you likely run in social circles with folks that have the skills to create the tool -- or perhaps if you do not know someone directly, your contacts might know folks that can create such a tool (or know if one exists).
      Your reply, above, was appreciated, and your videos are very good.
      Cheers!

    • @WebCreatorBrk
      @WebCreatorBrk 4 роки тому

      very cool!! but how i hook my win10 for hide process and netstat connections? send please

  • @robinhood3841
    @robinhood3841 4 роки тому

    How we can remove the silent process exit because its not show up in the Registery

    • @13Cubed
      @13Cubed  4 роки тому

      Not sure I understand your question?

  • @witoldawacz6818
    @witoldawacz6818 6 років тому +1

    Great video as usual. Some time ago i have found oddvar's article and i did update my forensics tools ;-) ... one of them is here: github.com/wit0k/regparser/blob/master/plugins/autoruns.py (but it's meant to be used on offline registry hives only)

    • @13Cubed
      @13Cubed  6 років тому

      Nice - thanks!

    • @WebCreatorBrk
      @WebCreatorBrk 4 роки тому

      @@13Cubed very cool!! but how i hook my win10 for hide process and netstat connections? send please

  • @haroldgar12
    @haroldgar12 5 років тому

    where do I go to create the evil.exe file

    • @13Cubed
      @13Cubed  5 років тому

      That was just an example. In real life, if this were to be abused, evil.exe would presumably be some type of malware.

    • @haroldgar12
      @haroldgar12 5 років тому

      @@13Cubed ya, I know. I just wanted to know how I would create a fake evil.exe file, like yours, where it would only display a message. I found out how to do it. Another question I have is, how would I install the commands in the command line of my victim if it requires admin privileges. I setup a victim laptop in my test environment and I'm able to create a session using an exploit, which allows me to access my victims laptop(my own), but when I try to use those 3 commands, it fails saying that I don't have privileges(which I figured it would). My victim laptop runs windows 10.

    • @13Cubed
      @13Cubed  5 років тому

      hdawg12 Yes, as you noted this does require local admin privileges. You would have to use some other exploit to attempt privilege escalation on the target. In this case you are modifying HKLM, not HKCU (hence the admin requirement).

    • @haroldgar12
      @haroldgar12 5 років тому

      @@13Cubed , ya thats what I figured. So once I find an exploit that give me admin privileges, I would use this method to install a backdoor payload in my Victim(which is my own laptop) allowing me access whenever my Victim turns on his laptop, correct?

    • @13Cubed
      @13Cubed  5 років тому

      hdawg12 In theory that’s how a malicious actor would exploit this, yes. My normal disclaimer applies - only do this in a lab environment, and only with proper permission. :)