<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Persistence on Zach Grace</title><link>https://zachgrace.com/tags/persistence/</link><description>Recent content in Persistence on Zach Grace</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 23 Mar 2015 00:00:00 +0000</lastBuildDate><atom:link href="https://zachgrace.com/tags/persistence/index.xml" rel="self" type="application/rss+xml"/><item><title>Hunting Sticky Keys Backdoors</title><link>https://zachgrace.com/posts/hunting-sticky-keys-backdoors/</link><pubDate>Mon, 23 Mar 2015 00:00:00 +0000</pubDate><guid>https://zachgrace.com/posts/hunting-sticky-keys-backdoors/</guid><description>&lt;p>The &amp;ldquo;sticky keys&amp;rdquo; backdoor method has been a favorite for hackers for years and it&amp;rsquo;s been gaining popularity as a malware-free persistence method. This backdoor method gives an attacker pre-authentication, SYSTEM-level access to a target remotely over RDP or locally via the console.&lt;/p>
&lt;p>The backdoor can be installed in one of two ways:&lt;/p>
&lt;ol>
&lt;li>Copy &lt;em>cmd.exe&lt;/em> over &lt;em>sethc.exe&lt;/em> or &lt;em>utilman.exe&lt;/em>&lt;/li>
&lt;li>Set &lt;em>cmd.exe&lt;/em> as the debugger for &lt;em>sethc.exe&lt;/em> or &lt;em>utilman.exe&lt;/em>&lt;/li>
&lt;/ol>
&lt;p>The &lt;em>sethc.exe&lt;/em> backdoor can be triggered by pressing the shift key five times in rapid succession. The &lt;em>utilman.exe&lt;/em> backdoor can be triggered by pressing windows+u.&lt;/p></description></item></channel></rss>