top of page

New lab setup with Azure and learning how malware gains persistence through registry keys

Thanks for stopping by and reading this blog post. Today we have a new lab setup in Azure with three virtual machines managed through Hyper V.


In one of the VM's I practising creating, hiding, renaming and deleting registry keys to learn how malware gains persistence in a system with registry keys.


I am creating keys that will open programs at startup for any user on the system, in this example I am just launching Edge at startup, simple enough I know, but it's all about understanding one of the many ways threat actors take advantage of the registry.


I am also going to investigating the [mis]use of task scheduler today.

 
 

Be in the Know

Add your email address below and I will send you interesting IT and cyber sec news from time to time.

Thanks for submitting!

  • Instagram
  • Twitter
  • LinkedIn
  • YouTube

© 2023 Dave TechGuy

bottom of page