User Accounts, Hash Cracking, RID Hijacking
Persistence in Windows
Definition
Persistence is a post-exploitation activity used by penetration testers in order to keep access to a system throughout the whole assessment and not to have to re-exploit the target even if the system restarts.
It can be considered that there are two types of persistence. These two types are:
Low privileged persistence
Privileged user persistenceLow Privileged Persistence
Low privileged persistence means that the penetration tester gained and uses persistence techniques to keep his access to the target system under a normal user profile/account (a domain user with no administrative rights).
Privileged User Persistence
After gaining access to a system, sometimes (because it would be inaccurate to say always), a penetration tester will do privilege escalation in order to gain access to the highest privilege user that can be on a Windows machine (nt authority\system).
After privilege escalation, he will use persistence in order to keep the access he gained.
Persistence Techniques
Account Tempering Techniques
Creating new users and assigning them to privileged groups.
Cracking accounts hashes (SAM, SYSTEM)
RID Hijacking
Creating new users and assigning them to privileged groups
Grabbing and Dumping SAM hashes
RID Hijacking
REFERENCES
https://github.com/Shuvsec/Pentesting-Resources/blobmain/Persistence%5BPost%20Exploitation%5D.md
https://www.ired.team/offensive-security/persistence/rid-hijacking
https://www.hackingarticles.in/windows-privilege-escalation-sebackupprivilege/
https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/secedit
Was this helpful?