Persistence Techniques (Beginner to Advanced) For Windows

<h1>Introduction:</h1> <p>Persistence is a Phase that&rsquo;s included in all the popular Security Frameworks such as<strong>&nbsp;Cyber/Unified kill chain or MITRE ATT&amp;CK</strong>. This phase is done after Exploitation (commonly) but it depends on the Roles of Engagements (ROE) &amp; your Approach Framework Processes.</p> <blockquote> <p><strong><em>What is Persistence &amp; Backdoor?</em></strong></p> <p><em>Persistence is a technique used to maintain a connection with target systems even if the machine is rebooted, shut down or whatever, we would still be able to have access to it.</em></p> <p><em>Backdoor attack definition is using any malware/virus/technology to gain unauthorized access to the application/system/network while bypassing all the implemented security measures.</em></p> <p><strong><em>Why it&rsquo;s important?</em></strong></p> <p>Here are some reasons why you&rsquo;d want to establish persistence as quick as possible</p> <p>&bull;&nbsp;<strong>Re-exploitation isn&rsquo;t always possible</strong>: Some unstable exploits might kill the vulnerable process during exploitation, getting you a single shot at some of them.</p> </blockquote> <p><a href="https://infosecwriteups.com/persistence-techniques-beginner-to-advanced-for-windows-50aca469336"><strong>Visit Now</strong></a></p>