AnyDesk | Graphical (RAT-like) Persistence
💬 Join the Community https://discord.gg/JNQdVnEXkm 🖥️ Presentation https://tinyurl.com/persistence-using-anydesk 📌 About Although Sliver-based implant persistence is highly effective, EDRs are quick to detect its artefacts. 💢 Did you know you can establish graphical, on-demand persistence using overly trusted third-party tools? No? Enter AnyDesk! 🗿 In HackerForce's latest video, sunflower covers: 1. Overly trusted software policies and how they can be exploited to establish persistence using tools such as AnyDesk 2. Installing AnyDesk on a target system silently, without triggering user prompts 3. Retrieving AnyDesk's connection identifier and configuring a password via Sliver's interface 4. Using AnyDesk to connect to the target system across network boundaries AnyDesk isn't just great for persistence—it's also an excellent RAT, given its ability to listen on the remote system, browse files, and all the other features covered in this video! 🐀 📚 Resources AnyDesk Linux client: https://anydesk.com/en/downloads/linux AnyDesk Windows server: https://anydesk.com/en/downloads/windows 🔔 Stay Connected X/Twitter: https://x.com/hackerforcex ⏱️ Timestamps 00:00 Introduction 01:02 Trusted software policies 02:38 AnyDesk 04:01 Requirements 04:39 Installing AnyDesk client 05:28 Installing AnyDesk server (on the victim) 07:42 Obtaining the server's connection identifier 08:15 Setting the server's password 08:56 Connecting to the victim server 09:27 Utilising AnyDesk 09:47 Upcoming 🔗 Tags #sliver #c2 #redteam #hacker #hack #penetrationtesters #pentesting #ta0003 #persistence #anydesk
Download
0 formatsNo download links available.