NetExec icon indicating copy to clipboard operation
NetExec copied to clipboard

Working Persistence Module

Open kapla0011 opened this issue 1 year ago • 1 comments

For now the rrp library has been removed from the module. This is the usage of each of the techniques:

add_user: This methods adds a new user to the admin group

image

We can also specify some input credentials:

image Checking if the credentials are valid:

image

file_upload:

This is just an upload function for file transfer purposes

image

malicious_binary

This technique involves copying a binary from a specified path to the user's startup folder.

image

proof:

image

registry_run:

This technique involves modifying the registry's Run key. Any executable path listed in the Run key will be executed when a user logs into the machine.

image

proof:

image

logon_scripts:

This techinique works by adding to the Logon Registry value the path of a .bat file with some custom commands inside.

image

proof:

image

scheduled_task:

creates a scheduled task that starts at every logon:

image

query the task:

image

win_logon_userinit:

the module adds to the UserInit value of winlogon the path of the malware:

image

query the registry:

image

kapla0011 avatar Nov 27 '24 15:11 kapla0011

Thanks for the PR! Having screenshots while reviewing definitely helps a lot :)

NeffIsBack avatar Nov 27 '24 16:11 NeffIsBack

Closing in favor of #807

NeffIsBack avatar Jul 17 '25 15:07 NeffIsBack