User Accounts, Hash Cracking, RID Hijacking

Persistence in Windows

Definition

Persistence is a post-exploitation activity used by penetration testers in order to keep access to a system throughout the whole assessment and not to have to re-exploit the target even if the system restarts.

It can be considered that there are two types of persistence. These two types are:

Low privileged persistence
Privileged user persistence

Low Privileged Persistence

Low privileged persistence means that the penetration tester gained and uses persistence techniques to keep his access to the target system under a normal user profile/account (a domain user with no administrative rights).

Privileged User Persistence

After gaining access to a system, sometimes (because it would be inaccurate to say always), a penetration tester will do privilege escalation in order to gain access to the highest privilege user that can be on a Windows machine (nt authority\system).

After privilege escalation, he will use persistence in order to keep the access he gained.


Persistence Techniques

Account Tempering Techniques

  • Creating new users and assigning them to privileged groups.

  • Cracking accounts hashes (SAM, SYSTEM)

  • RID Hijacking

Creating new users and assigning them to privileged groups

Grabbing and Dumping SAM hashes

RID Hijacking


REFERENCES

  • https://github.com/Shuvsec/Pentesting-Resources/blobmain/Persistence%5BPost%20Exploitation%5D.md

  • https://www.ired.team/offensive-security/persistence/rid-hijacking

  • https://www.hackingarticles.in/windows-privilege-escalation-sebackupprivilege/

  • https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/secedit

Was this helpful?