Room progress ( 0% )
Task 1Introduction
Task 2Tampering With Unprivileged Accounts
Task includes a deployable machine
Task 3Backdooring Files
Task 4Abusing Services
Task 5Abusing Scheduled Tasks
Task 6Logon Triggered Persistence
Task 7Backdooring the Login Screen / RDP
Task 8Persisting Through Existing Services
Task 9Conclusion
Ready to learn Cyber Security? Create your free account today!
The Windows Local Persistence room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in