3. Maintain Remote Access and Hide Malicious Activities
Remote code execution techniques are often performed after initially compromising a system and further expanding access to remote systems present on the target network.
1. User system Monitoring with PowerSpy
2. System Monitoring with Spytech spyagent
3. User System Monitoring and Surveillance using Spyrix
4. Maintain Persistence by Modifying Registry Run Keys




5. Hide files using NTFS ADS Streams






Appending Text File as ADS example


6. Hide data using white space steganography



7. Image Steganography using OpenStego and Stegonline
OpenStego

Stegonline

8. Maintain persistence abusing boot or Logon autostart

9. Maintain Domain Persistence exploiting Active Directory Objects




10. Priv Esc with WMI and maintain persistance

11. Covert channels using covert_TCP





Last updated

