Diverse Evading EDR: Der umfassende Leitfaden zur Umgehung von Erkennungssystemen

Einführung in die häufigsten Komponenten von EDR-SystemenErklärung von Funktion Hooking, Callback-Benachrichtigungen und Event Tracing for WindowsAnalyse von Dateisystem-Minifiltern und deren DatensammlungDokumentierte Strategien zur Umgehung von ErkennungenSchutzmaßnahmen für Verteidiger gegen AngriffeUmfassende Anleitung zur Funktionsweise von EDR-Systemen
wenigermehr
Anzeige

Beste Angebote

33,99
Versand: frei!
42,99
Versand: frei!
42,99
Versand: frei!
Anzeige

Preisvergleich

Inkl. Versand
Sortieren:
Beste Treffer
Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems. 1718503342
Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems.
prodImage
33,99
33,99
Versand: frei!
Versand: frei!
Random House LLC US Evading EDR A1068372844
EDR, demystified! Stay a step ahead of attackers with this comprehensive guide to understanding the attack-detection software running on Microsoft systems—and how to evade it. Nearly every enterprise uses an Endpoint Detection and Response (EDR) agent to monitor the devices on their network for signs of an attack. But that doesn't mean security defenders grasp how these systems actually work. This book demystifies EDR, taking you on a deep dive into how EDRs detect adversary activity. Chapter by chapter, you’ll learn that EDR is not a magical black box—it’s just a complex software application built around a few easy-to-understand components. The author uses his years of experience as a red team operator to investigate each of the most common sensor components, discussing their purpose, explaining their implementation, and showing the ways they collect various data points from the Microsoft operating system. In addition to covering the theory behind designing an effective EDR, each chapter also reveals documented evasion strategies for bypassing EDRs that red teamers can use in their engagements.
prodImage
42,99
42,99
Versand: frei!
Versand: frei!
Random House LLC US Evading EDR
EDR, demystified! Stay a step ahead of attackers with this comprehensive guide to understanding the attack-detection software running on Microsoft systems—and how to evade it. Nearly every enterprise uses an Endpoint Detection and Response (EDR) agent to monitor the devices on their network for signs of an attack. But that doesn't mean security defenders grasp how these systems actually work. This book demystifies EDR, taking you on a deep dive into how EDRs detect adversary activity. Chapter by chapter, you’ll learn that EDR is not a magical black box—it’s just a complex software application built around a few easy-to-understand components. The author uses his years of experience as a red team operator to investigate each of the most common sensor components, discussing their purpose, explaining their implementation, and showing the ways they collect various data points from the Microsoft operating system. In addition to covering the theory behind designing an effective EDR, each chapter also reveals documented evasion strategies for bypassing EDRs that red teamers can use in their engagements.
prodImage
42,99
42,99
Versand: frei!
Versand: frei!
Penguin Random House Evading EDR, Fachbücher von Matt Hand
EDR, demystified! Stay a step ahead of attackers with this comprehensive guide to understanding the attack-detection software running on Microsoft systems—and how to evade it.Nearly every enterprise uses an Endpoint Detection and Response (EDR) agent to monitor the devices on their network for signs of an attack. But that doesn't mean security defenders grasp how these systems actually work. This book demystifies EDR, taking you on a deep dive into how EDRs detect adversary activity. Chapter by chapter, you'll learn that EDR is not a magical black box—it's just a complex software application built around a few easy-to-understand components.The author uses his years of experience as a red team operator to investigate each of the most common sensor components, discussing their purpose, explaining their implementation, and showing the ways they collect various data points from the Microsoft operating system. In addition to covering the theory behind designing an effective EDR, each chapter also reveals documented evasion strategies for bypassing EDRs that red teamers can use in their engagements.
prodImage
43,80
43,80
Versand: frei!
Versand: frei!
prodImage
33,99
Versand: frei!
prodImage
42,99
Versand: frei!
prodImage
42,99
Versand: frei!
prodImage
43,80
Versand: frei!
mozilla/5.0 applewebkit/537.36 (khtml, like gecko; compatible; claudebot/1.0; [email protected])
x-pixel