Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems (Paperback)
Hand, Matt
- 出版商: No Starch Press
- 出版日期: 2023-10-31
- 定價: $2,100
- 售價: 9.5 折 $1,995
- 語言: 英文
- 頁數: 312
- 裝訂: Quality Paper - also called trade paper
- ISBN: 1718503342
- ISBN-13: 9781718503342
-
相關分類:
資訊安全、駭客 Hack
立即出貨 (庫存=1)
買這商品的人也買了...
-
$281C++黑客編程揭秘與防範(第2版)
-
$454黑客大曝光:工業控制系統安全 (Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions)
-
$403黑客大曝光 : 惡意軟件和 Rootkit 安全, 2/e
-
$1,620Functional Programming in C++: How to improve your C++ programs using functional techniques (Paperback)
-
$520$406 -
$465黑客攻防大曝光:社會工程學、電腦黑客攻防、移動黑客攻防技術揭秘
-
$359$341 -
$690$538 -
$1,925$1,829 -
$1,330$1,264 -
$1,710Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly (Paperback)
-
$1,663Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats
-
$620$527 -
$2925G 與車聯網 — 基於移動通信的車聯網技術與智能網聯汽車
-
$3605G時代:什麼是5G,它將如何改變世界
-
$780$663 -
$2,200$2,090 -
$780$663 -
$360$284 -
$880$695 -
$1,444Learn Enough JavaScript to Be Dangerous: A Tutorial Introduction to Programming with JavaScript
-
$654$621 -
$1,500$1,425 -
$880$695 -
$720$562
商品描述
EDR, demystified! Stay a step ahead of attackers with this comprehensive guide to understanding the attack-detection software running on Microsoft systems--and how to evade it.
Nearly every enterprise uses an Endpoint Detection and Response (EDR) agent to monitor the devices on their network for signs of an attack. But that doesn't mean security defenders grasp how these systems actually work. This book demystifies EDR, taking you on a deep dive into how EDRs detect adversary activity. Chapter by chapter, you'll learn that EDR is not a magical black box--it's just a complex software application built around a few easy-to-understand components.
The author uses his years of experience as a red team operator to investigate each of the most common sensor components, discussing their purpose, explaining their implementation, and showing the ways they collect various data points from the Microsoft operating system. In addition to covering the theory behind designing an effective EDR, each chapter also reveals documented evasion strategies for bypassing EDRs that red teamers can use in their engagements.
作者簡介
Matt Hand is an experienced red team operator with over a decade of experience. His primary areas of focus are in vulnerability research and EDR evasion where he spends a large amount of time conducting independent research, developing tooling, and publishing content. Matt is currently a Service Architect at SpecterOps where he focuses on improving the technical and execution capabilities of the Adversary Simulation team, as well as serving as a subject matter expert on evasion tradecraft.