Red Team Notes
linkedintwitterpatreongithub
Search
⌃K
Links
What is ired.team notes?
Pinned
Pentesting Cheatsheets
Active Directory & Kerberos Abuse
offensive security
Red Team Infrastructure
Initial Access
Code Execution
Code & Process Injection
Defense Evasion
Enumeration and Discovery
Privilege Escalation
Credential Access & Dumping
Lateral Movement
Persistence
DLL Proxying for Persistence
Schtask
Service Execution
Sticky Keys
Create Account
AddMonitor()
NetSh Helper DLL
Abusing Windows Managent Instrumentation
Windows Logon Helper
Hijacking Default File Extension
Persisting in svchost.exe with a Service DLL
Modifying .lnk Shortcuts
Screensaver Hijack
Application Shimming
BITS Jobs
COM Hijacking
SIP & Trust Provider Hijacking
Hijacking Time Providers
Installing Root Certificate
Powershell Profile Persistence
RID Hijacking
Word Library Add-Ins
Office Templates
Exfiltration
reversing, forensics & misc
Internals
Cloud
Neo4j
Dump Virtual Box Memory
AES Encryption Using Crypto++ .lib in Visual Studio C++
Reversing Password Checking Routine
Powered By GitBook

Create Account

Persistence

Execution

[email protected]
net user test test123 /add /domain

Observations

commandline arguments
There is a whole range of interesting events that could be monitored related to new account creation:
Details for the newly added account are logged as event 4720 :

References

Create Account, Technique T1136 - Enterprise | MITRE ATT&CK®
​
Previous
Sticky Keys
Next
AddMonitor()
Last modified 4yr ago
Copy link
On this page
Execution
Observations
References