Defense Evasion Techniques. A comprehensive guide to defense evasion tactics for Red Teams and Penetration Testers - Helion
Tytuł oryginału: Defense Evasion Techniques. A comprehensive guide to defense evasion tactics for Red Teams and Penetration Testers
ISBN: 9781805120681
stron: 590, Format: ebook
Księgarnia: Helion
Cena książki: 139,00 zł
Książka będzie dostępna od października 2024
Defense evasion techniques refer to methods used by attackers to evade detection by security measures and avoid being blocked or removed from a targeted system or network.
The book will address Defense Evasion concepts and techniques and will focus on topics like antivirus, EDR, Firewalls, Application Controls, WAF, and finally methods used by malware to avoid reverse engineering and other security controls. The readers will find it very helpful in understanding Security Concept Basics, Windows APIs and Sysinternals.
By the end of the book the readers will be comfortable securing their environments by understanding their security measures and detections against those who try to fly under the radar.
Zobacz także:
- Windows Media Center. Domowe centrum rozrywki 66,67 zł, (8,00 zł -88%)
- Ruby on Rails. Ćwiczenia 18,75 zł, (3,00 zł -84%)
- Przywództwo w świecie VUCA. Jak być skutecznym liderem w niepewnym środowisku 58,64 zł, (12,90 zł -78%)
- Scrum. O zwinnym zarządzaniu projektami. Wydanie II rozszerzone 58,64 zł, (12,90 zł -78%)
- Od hierarchii do turkusu, czyli jak zarządzać w XXI wieku 58,64 zł, (12,90 zł -78%)
Spis treści
Defense Evasion Techniques. A comprehensive guide to defense evasion tactics for Red Teams and Penetration Testers eBook -- spis treści
- 1. Cybersecurity Concepts
- 2. Threat Intelligence and Threat Hunting
- 3. Understanding Windows API
- 4. Sysinternal Tools for Defence Evasion
- 5. WAF Evasion Techniques
- 6. How Firewall Works
- 7. Firewall Evasion Techniques
- 8. How Antivirus Works
- 9. Antivirus Evasion Techniques
- 10. Understanding Endpoint Detection and Response (EDR)
- 11. EDR Evasion Techniques
- 12. Application Control Bypass
- 13. Windows Control Evasion Techniques
- 14. Software Control Evastion Techniques
- 15. Understanding Malwares
- 16. Malware Evasion Techniques
- 17. Anti-Malware Evasion Control Techniques