Adversaries commonly use persistence techniques to ensure that they can maintain access to a target machine despite reboots and other actions that could evict them. Luckily for defenders, persistence mechanisms often generate telemetry that security operations centers can use to catch malicious activity.
In this video, Red Canary contributing author and Carbon Black senior threat researcher Greg Foss demonstrates with seven different tools how you can observe WMI Event Subscription-based persistence and detect the threats that leverage this technique.