Explore the intricacies of malware morphology in this comprehensive 2-hour and 47-minute workshop from NorthSec. Delve into the diverse implementation methods within attack techniques, moving beyond the narrow focus on specific tools to understand underlying behaviors. Learn to analyze and compare different tools implementing the same technique, such as LSASS Dumping, to identify evasion opportunities. Develop skills in modeling various procedures to evaluate their similarities and determine optimal events or logs for building resilient detection rules. Gain valuable insights for detection engineers to enhance their ability to create more effective and comprehensive defense strategies against evolving malware threats.
Overview
Syllabus
Malware Morphology for Detection Engineers
Taught by
NorthSec