Limit search to available items
Book Cover
E-book
Author Hand, Matt, author

Title Evading EDR : sensors, telemetry, and how to bypass them / by Matt Hand
Published San Francisco, CA : No Starch Press, [2024]

Copies

Description 1 online resource
Contents EDR-chitecture -- Function-hooking DLLs -- Thread and process notifications -- Object notifications -- Image-load and registry notifications -- Minifilters -- Network filter drivers -- Event tracing for Windows -- Scanners -- Antimalware scan interface -- Early launch anti-malware drivers -- Microsoft-Windows-threat-intelligence -- A detection-aware attack
Summary "Introduces readers to the most common components of EDR systems, including function hooking, callback notifications, Event Tracing for Windows, and filesystem minifilters, by explaining how they are implemented and how they collect various data points. Covers documented evasion strategies for bypassing detections and describes how defenders might protect themselves"-- Provided by publisher
Bibliography Includes bibliographical references and index
Notes Description based on print version record and CIP data provided by publisher; resource not viewed
SUBJECT Microsoft Windows (Computer file) http://id.loc.gov/authorities/names/n88027331
Microsoft Windows (Computer file) fast (OCoLC)fst01367862
Subject Penetration testing (Computer security)
Intrusion detection systems (Computer security)
Computer security -- Computer programs
Computer networks -- Security measures -- Data processing
Operating systems (Computers) -- Protection
Computer security -- Computer programs.
Intrusion detection systems (Computer security)
Penetration testing (Computer security)
Form Electronic book
LC no. 2023016499
ISBN 1718503350
9781718503359
Other Titles Evading endpoint detection and response