Jump to content
Nytro

Windows persistence mechanisms

Recommended Posts

Posted

The repository tries to gather an information about Windows persistence mechanisms to make the protection/detection more efficient. Most of the information is well known for years, being actively used within various scenarios.
Expect more. I am doing my best to add new entries each day.

How it works. And how to contribute.


👨‍💼 HKCU Run and RunOnce registry keys

👨‍💼 ⚙ Task Scheduler

⚙ Image File Execution Options key

⚙ Windows Services

AeDebug

WER Debugger *

⚙ Natural Language Development Platform 6 DLLs *

⚙ GPO Client-side Extension

⚙ Filter Handlers for Windows Search

Disk Cleanup Handler

👨‍💼 .chm helper DLL *

hhctrl.ocx *

⚙ AMSI Providers

⚙ ServerLevelPluginDll

Password Filter

Credential Manager DLL

⚙ Authentication Packages

Code Signing DLL

👨‍💼 HKCU cmd.exe AutoRun

⚙ LSA Extension

⚙ Winlogon Notification Package

⚙ Print Monitor

👨‍💼 HKCU Load

MPNotify

⚙ Windows Platform Binary Table

Explorer tools *

👨‍💼 Windows Terminal Profile

👨‍💼 Startup Folder

👨‍💼 User Init Mpr Logon Script *

⚙ Autodial DLL *

.NET Startup Hooks

👨‍💼 PowerShell Profiles

👨‍💼 TS Initial Program

Want more? Check the list tomorrow. :)


* Based on a research made by @Hexacorn - one of the best persistence hunters.

⚙ It is enough to turn computer on to make the code run.
👨‍💼 End-user can do it.

 

Sursa: https://persistence-info.github.io/

  • Like 2

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...