Windows Persistence
Overview
What is Persistence?
Definition
Why Persistence Matters for PJPT
Registry-Based Persistence
1. Registry Run Keys
Current User Run Key
Local Machine Run Key (Requires Admin)
Additional Registry Locations
2. Registry Persistence Examples
Service-Based Persistence
1. Creating Windows Services
2. Modifying Existing Services
3. Service DLL Hijacking
Scheduled Tasks Persistence
1. Basic Scheduled Task Creation
2. PowerShell Scheduled Tasks
3. Scheduled Task Management
Startup Folder Persistence
1. User Startup Folder
2. All Users Startup Folder (Admin Required)
WMI Persistence
1. WMI Event Subscription
2. WMI Persistence Cleanup
DLL Hijacking Persistence
1. DLL Search Order Hijacking
2. Phantom DLL Hijacking
Advanced Persistence Techniques
1. COM Hijacking
2. AppInit_DLLs
3. Accessibility Features Backdoor
PowerShell-Based Persistence
1. PowerShell Profile Modification
2. PowerShell ISE Persistence
Persistence Detection Evasion
1. Timestomping
2. File Attribute Manipulation
Practical Persistence Scenarios
Scenario 1: User-Level Persistence
Scenario 2: System-Level Persistence
Scenario 3: Stealth Persistence
Cleanup and Removal
Registry Cleanup
Service Cleanup
Scheduled Task Cleanup
PJPT Exam Tips
Essential Commands to Memorize
Documentation Requirements
Common Mistakes to Avoid
Last updated