Persistence: Difference between revisions

From Enlace Hacktivista
Jump to navigation Jump to search
mNo edit summary
mNo edit summary
 
Line 9: Line 9:
* PAM: [https://book.hacktricks.xyz/linux-hardening/linux-post-exploitation Pluggable Authentication Module]
* PAM: [https://book.hacktricks.xyz/linux-hardening/linux-post-exploitation Pluggable Authentication Module]
* DNS: https://github.com/iagox86/dnscat2
* DNS: https://github.com/iagox86/dnscat2
* Blog: Windows Persistence Techniques: https://www.ired.team/offensive-security/persistence
* Blog - Windows Persistence Techniques: https://www.ired.team/offensive-security/persistence


==== C2 Frameworks ====
==== C2 Frameworks ====

Latest revision as of 16:03, 4 August 2023

See below tools, resources and frameworks to achieve persistence, make sure to customize and obfuscate your implants to avoid AV detection.

C2 Frameworks

C2 Matrix. Open source and closed source command and control (C2) frameworks. Go to popular forums to find cracked frameworks such as cobalt strike.