Its Matter in DFIR#1: Persistence without Privileges!?

Its Matter in DFIR#1: Persistence without Privileges!?

Windows 11:?
C:\Users\<username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp        

The easy persistence location for a Red Teamer to implant malware with user-level privileges and for a Threat Hunter to identify low-hanging fruit.

Successfully phished users' hosts maintain persistence fingerprints in specified paths to survive reboots.


Why not Registry?

No Admin Rights, No Modification??

Most of the time, first-stage payloads tend to establish simple persistence without generating much noise.

Harlan Carvey

Staff Threat Intel Analyst, Adversary Tactics

1 年

Is the correct path "...AppData\Roaming\Microsoft\Windows\Start Menu\Programs", or is it "...AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp"?

Aadarshini Rajendran

Business Development Executive at Sheen Services WLL | Specializing in Translation Attestation, Localization & Website Translation | Connecting Businesses with Global Markets

1 年

Nice Mr Talha Mehmood

要查看或添加评论,请登录

Abrar Hussain的更多文章

社区洞察

其他会员也浏览了