Completed
Goals of an Evasive Adversary 2. Delection and Detection Subversion Methodologies 3. Rationale for Targeting Sysmon 4. Data Collector Subversion Strategies Applied to Sysmon 5. Conclusion
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Subverting Sysmon - Application of a Formalized Security Product Evasion Methodology
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Goals of an Evasive Adversary 2. Delection and Detection Subversion Methodologies 3. Rationale for Targeting Sysmon 4. Data Collector Subversion Strategies Applied to Sysmon 5. Conclusion
- 3 Subverting security solutions is simply an engineering challenge of adversaries.
- 4 1. Tool Familiarization and Scoping
- 5 Data Source Resilience Auditing
- 6 Data Collection Implementation Analysis
- 7 4. Footprint/Attack Surface Analysis
- 8 Configuration Analysis