In this technical blog post, we’ll explain in-depth two uncommon and difficult-to-detect techniques that can be leveraged to maintain persistence. These techniques will be used from within user space, meaning we can use these techniques without having to resort to the installation or manipulation of drivers or minifilter drivers (rootkit techniques). Instead, we’ll abuse operating system features to give us our persistence.
Before we dive in, here are some prerequisites you’ll need to follow along.