i've been searching for a long time for ways to maintain my backdoor and not lose it after system restart Thank you so much sir your work is highly appreciated
how can one remember all these commands ? i think i might have to write some notes and reference these commands when needed. is that how you guys do it?
I would recommend taking a lot of notes for the commands, I like using Obsidian for my documentation. For each topic write a list of commands neccesary to do the thing you want, for example: Step 1: use the sysinternal tool 'accesschk.exe /accepteula -uwcqv {user} {service}' to check the {user}'s permission for a service, if the SERVICE_CHANGE_CONFIG option is allowed, this service could be used for privesc. Step 2: use command 'sc qc {service}' to ... This way you can quickly recall the commands used for this privilege escalation. It's definitely not possible to memorize all commands we use for hacking, so we use our tools to help us out :)
i've been searching for a long time for ways to maintain my backdoor and not lose it after system restart
Thank you so much sir
your work is highly appreciated
Double the fun double the learning ❤️❤️
Thank You For Making This Type of video And Working for Us.
Is this related to Insecure Win Svc Permissions, Plugin 65057?
I gave up on thm. I did learn a lot but I felt like I was guessing to fill in those asterisks a lot
are you having trouble remember all these commands? i think one has to have a super memory to recall everything. i get analysis paralysis .
@@kaineuler it becomes 2nd nature after a while
Ahh man we miss your keyboard thocks :D
how can one remember all these commands ? i think i might have to write some notes and reference these commands when needed. is that how you guys do it?
I would recommend taking a lot of notes for the commands, I like using Obsidian for my documentation. For each topic write a list of commands neccesary to do the thing you want, for example:
Step 1: use the sysinternal tool 'accesschk.exe /accepteula -uwcqv {user} {service}' to check the {user}'s permission for a service, if the SERVICE_CHANGE_CONFIG option is allowed, this service could be used for privesc.
Step 2: use command 'sc qc {service}' to ...
This way you can quickly recall the commands used for this privilege escalation.
It's definitely not possible to memorize all commands we use for hacking, so we use our tools to help us out :)
Is this video about red team?
Yes ! This falls video falls under read team catagory
Nice
kali max here