Subverting Sysmon - Application of a Formalized Security Product Evasion Methodology

Subverting Sysmon - Application of a Formalized Security Product Evasion Methodology

Black Hat via YouTube Direct link

Goals of an Evasive Adversary 2. Delection and Detection Subversion Methodologies 3. Rationale for Targeting Sysmon 4. Data Collector Subversion Strategies Applied to Sysmon 5. Conclusion

2 of 8

2 of 8

Goals of an Evasive Adversary 2. Delection and Detection Subversion Methodologies 3. Rationale for Targeting Sysmon 4. Data Collector Subversion Strategies Applied to Sysmon 5. Conclusion

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Subverting Sysmon - Application of a Formalized Security Product Evasion Methodology

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Goals of an Evasive Adversary 2. Delection and Detection Subversion Methodologies 3. Rationale for Targeting Sysmon 4. Data Collector Subversion Strategies Applied to Sysmon 5. Conclusion
  3. 3 Subverting security solutions is simply an engineering challenge of adversaries.
  4. 4 1. Tool Familiarization and Scoping
  5. 5 Data Source Resilience Auditing
  6. 6 Data Collection Implementation Analysis
  7. 7 4. Footprint/Attack Surface Analysis
  8. 8 Configuration Analysis

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.