Description: TWITTER: @SLYDGOTCHA
BLOG: REDPATHINTEL.BLOGSPOT.COM
Hey all, I'm working on a project I call the points of persistence. This will consist of a small series of videos related to post exploitation. In this video I talk about ways to go about maintaining access on a computer from a conceptual point of view. In the next two videos we take these concepts learned and actually apply them to computer systems.
Feedback is appreciated.
Tags: post exploitation , persistence , exploitation , msfencode , msfvenom , malicious services , payloads ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Thanks you so much for making this video. I’ve learnt so much about how malware remains persistence within windows and the techniques used. I hope this series continues on to explore more of the advanced topics show in the chart when you explained PTES. Again excellent video man can’t wait for more to come.