LSASS Driver (T1547.008)

View on ATT&CK

In Playbook

Associated Tactics

  • Persistence
  • Privilege Escalation

Persistence (TA0003)

The adversary is trying to maintain their foothold. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.

View on ATT&CK

Procedure Examples

Description Source(s)
Microsoft. (2014, March 12). Configuring Additional LSA Protection. Retrieved November 27, 2017. Microsoft LSA Protection Mar 2014
Microsoft. (n.d.). Dynamic-Link Library Security. Retrieved November 27, 2017. Microsoft DLL Security
Microsoft. (n.d.). Security Subsystem Architecture. Retrieved November 27, 2017. Microsoft Security Subsystem
Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016. TechNet Autoruns