Maintaining Access
Last updated
Last updated
run persistence -h
exploit/windows/local/persistent
exploit/windows/local/registrery_persistence
run scheduleme
run schtaskabuse
net user username password /add
Note: In a real pentest the best option is just to Add a user, other options are not really useful as pentesters