Defense Evasion Techniques. A comprehensive guide to defense evasion tactics for Red Teams and Penetration Testers - Helion

Tytuł oryginału: Defense Evasion Techniques. A comprehensive guide to defense evasion tactics for Red Teams and Penetration Testers
ISBN: 9781805120681
stron: 590, Format: ebook
Księgarnia: Helion
Cena książki: 139,00 zł
Książka będzie dostępna od października 2024
Defense evasion techniques refer to methods used by attackers to evade detection by security measures and avoid being blocked or removed from a targeted system or network.
The book will address Defense Evasion concepts and techniques and will focus on topics like antivirus, EDR, Firewalls, Application Controls, WAF, and finally methods used by malware to avoid reverse engineering and other security controls. The readers will find it very helpful in understanding Security Concept Basics, Windows APIs and Sysinternals.
By the end of the book the readers will be comfortable securing their environments by understanding their security measures and detections against those who try to fly under the radar.
Zobacz także:
- Jak zhakowa 125,00 zł, (10,00 zł -92%)
- Blockchain i kryptowaluty. Kurs video. Zdecentralizowane finanse od podstaw 118,90 zł, (11,89 zł -90%)
- Web scraping. Kurs video. Zautomatyzowane pozyskiwanie danych z sieci 126,36 zł, (13,90 zł -89%)
- GraphQL. Kurs video. Buduj nowoczesne API w Pythonie 153,64 zł, (16,90 zł -89%)
- Windows Media Center. Domowe centrum rozrywki 66,67 zł, (8,00 zł -88%)
Spis treści
Defense Evasion Techniques. A comprehensive guide to defense evasion tactics for Red Teams and Penetration Testers eBook -- spis treści
- 1. Cybersecurity Concepts
- 2. Threat Intelligence and Threat Hunting
- 3. Understanding Windows API
- 4. Sysinternal Tools for Defence Evasion
- 5. WAF Evasion Techniques
- 6. How Firewall Works
- 7. Firewall Evasion Techniques
- 8. How Antivirus Works
- 9. Antivirus Evasion Techniques
- 10. Understanding Endpoint Detection and Response (EDR)
- 11. EDR Evasion Techniques
- 12. Application Control Bypass
- 13. Windows Control Evasion Techniques
- 14. Software Control Evastion Techniques
- 15. Understanding Malwares
- 16. Malware Evasion Techniques
- 17. Anti-Malware Evasion Control Techniques





