Overview
Learn about malware persistence techniques and adversary exploitation of Windows systems in this 23-minute technical video. Explore how attackers maintain access to compromised systems, discover common persistence mechanisms used by malware, and understand the methods adversaries employ to establish long-term footholds in Windows environments. Gain valuable insights into detecting and defending against persistent threats through practical examples and real-world scenarios.
Syllabus
Malware And Hunting For Persistence: How Adversaries Exploit Your Windows? - Cocomelonc
Taught by
Cooper