Subverting Sysmon - Application of a Formalized Security Product Evasion Methodology

Subverting Sysmon - Application of a Formalized Security Product Evasion Methodology

Black Hat via YouTube Direct link

Intro

1 of 8

1 of 8

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Subverting Sysmon - Application of a Formalized Security Product Evasion Methodology

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Goals of an Evasive Adversary 2. Delection and Detection Subversion Methodologies 3. Rationale for Targeting Sysmon 4. Data Collector Subversion Strategies Applied to Sysmon 5. Conclusion
  3. 3 Subverting security solutions is simply an engineering challenge of adversaries.
  4. 4 1. Tool Familiarization and Scoping
  5. 5 Data Source Resilience Auditing
  6. 6 Data Collection Implementation Analysis
  7. 7 4. Footprint/Attack Surface Analysis
  8. 8 Configuration Analysis

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.