Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)
-
Updated
Sep 15, 2022 - C++
Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)
Weaponizing for privileged file writes bugs with PrintNotify Service
Resources About Persistence, Multiple Platforms. Including ~80 Tools and 300+ Posts.
Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, ProjectSauron, APT29, EquationGroup, including Stuxnet / Flame.
This guide empowers non-tech Windows users to detect persistence threats, highlighting signs like cmd windows at startup, registry checks, and spotting malicious commands in PowerShell, cmd, rundll32, and wmic.
Add a description, image, and links to the windows-persistence topic page so that developers can more easily learn about it.
To associate your repository with the windows-persistence topic, visit your repo's landing page and select "manage topics."