Infiltr8: The Red-Book
search
Ctrlk
Infiltr8ForumGitHub
Infiltr8: The Red-Book
  • The Red-Book
  • Red-Teaming
    • Reconnaissance
    • Execution
    • Initial Access
    • Persistence
      • Active Directory
      • Windows
        • Accessibility features Backdoor
        • AEDebug Keys Persistence
        • Image File Execution Options (IFEO) Persistence
        • Logon Triggered Persistence
        • LSA Persistence
        • Natural Language 6 DLLs Persistence
        • Run Keys Persistence
        • Winlogon Persistence
        • WMI Event Subscription Persistence
      • Linux
    • Defense Evasion
    • Discovery
    • Privilege Escalation
    • Credential Access
    • Lateral Movement
    • Exfiltration
  • Web Pentesting
    • Reconnaissance
    • Infrastructures
    • Web Vulnerabilities
  • Network Pentesting
    • Network services
    • WiFi
    • Bluetooth
  • Active Directory Pentesting
    • Reconnaissance
    • Movement
    • Persistence
  • Smart Contracts Pentesting
    • On-Chain Analysis
    • Smart Contract Vulnerabilities
  • Cloud & CI/CD Pentesting
    • Kubernetes
    • CI/CD
    • Azure Pentesting
    • 🛠️GCP Pentesting
    • 🛠️AWS Pentesting
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. Red-Teamingchevron-right
  2. Persistence

Windows

Accessibility features Backdoorchevron-rightAEDebug Keys Persistencechevron-rightImage File Execution Options (IFEO) Persistencechevron-rightLogon Triggered Persistencechevron-rightLSA Persistencechevron-rightNatural Language 6 DLLs Persistencechevron-rightRun Keys Persistencechevron-rightWinlogon Persistencechevron-rightWMI Event Subscription Persistencechevron-right

Last updated 3 years ago