Completed
Intro
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Subverting Sysmon - Application of a Formalized Security Product Evasion Methodology
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Goals of an Evasive Adversary 2. Delection and Detection Subversion Methodologies 3. Rationale for Targeting Sysmon 4. Data Collector Subversion Strategies Applied to Sysmon 5. Conclusion
- 3 Subverting security solutions is simply an engineering challenge of adversaries.
- 4 1. Tool Familiarization and Scoping
- 5 Data Source Resilience Auditing
- 6 Data Collection Implementation Analysis
- 7 4. Footprint/Attack Surface Analysis
- 8 Configuration Analysis