Scheduled Jobs, Tasks and Custom Daemons
Windows functionality which allows users to schedule automated tasks on local or remote computers can be used for post-exploitation and persistence. The Task Scheduler can be used to bypass UAC if the user has access to its GUI. This is possible because the security option runs with the systems highest privileges. Scheduled tasks can be used to exfiltrate data over time without raising alarms.
Custom Daemons, Processes, and Additional Backdoors
You can create your own custom daemons and processes on a victim system, as well as additional backdoors. Backdoors must survive reboots to maintain persistence, this can be achieved by creating daemons which start at bootup.
Last updated