Windows Persistence
Last updated
Last updated
consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. - MITRE ATT&CK
❗ Persistence techniques and methods usually require administrative access and must follow the rules of engagement agree with the customer.