- Oct 8, 2017
- 30
Hi,
I am interested in finding out how a network based attack achieves persistance and methods to stop it from achieving persistance.
Lets say an network attack exploit succeessfully works, and a minimal payload is now in ram. How does it survive a reboot ? I have a long list of registry keys to check against for starting programs. if I had made a baseline first. But I don't know if that list is exhaustive or not.
But that registry list is for program startups. And I have an anti-executable for protection to compensate for not knowing all the program startup registry keys. Are there any other ways to start a process at boot or acc sign in ?. And how can one check for those ?
I am interested in finding out how a network based attack achieves persistance and methods to stop it from achieving persistance.
Lets say an network attack exploit succeessfully works, and a minimal payload is now in ram. How does it survive a reboot ? I have a long list of registry keys to check against for starting programs. if I had made a baseline first. But I don't know if that list is exhaustive or not.
But that registry list is for program startups. And I have an anti-executable for protection to compensate for not knowing all the program startup registry keys. Are there any other ways to start a process at boot or acc sign in ?. And how can one check for those ?