Gain expertise in primary evasion techniques by studying notable examples and analyzing the leading security and response solutions available in the market.
Key Features
Gain a thorough understanding of the inner workings of Windows
Discover evasion techniques that have been uncovered by researchers in crucial security controls
Learn about bypass methods employed in network security tools and how to counteract them
Book DescriptionDefense evasion techniques refer to methods used by attackers to evade detection by security measures and avoid being blocked or removed from a targeted system or network.
The book will address Defense Evasion concepts and techniques and will focus on topics like antivirus, EDR, Firewalls, Application Controls, WAF, and finally methods used by malware to avoid reverse engineering and other security controls. The readers will find it very helpful in understanding Security Concept Basics, Windows APIs and Sysinternals.
By the end of the book the readers will be comfortable securing their environments by understanding their security measures and detections against those who try to fly under the radar.What you will learn
Learn the methods attackers use to evade detection and infiltrate systems and networks
Dissect advanced evasion techniques uncovered by researchers in critical security controls
Understand bypass methods used in network security tools and how to counteract them
Deep dive into primary evasion techniques used by malware and how to defend against them
Understand security concept basics, Windows APIs, and Sysinternals
Enhance knowledge of antivirus, EDR, firewalls, and application controls
Learn techniques for preventing reverse engineering and other security controls
Prepare effective detection and prevention of covert attacks to secure environments
Who this book is forThe primary audience include job roles like penetration testers, security researchers, security analysts and Red & Blue teams. The secondary audience include cybersecurity students, professionals, PEN-300 aspirants, and any software developer working on security products and want to get skills with defense evasion in many layers.
Table of Contents
Cybersecurity Concepts
Threat Intelligence and Threat Hunting
Understanding Windows API
Sysinternal Tools for Defence Evasion
WAF Evasion Techniques
How Firewall Works
Firewall Evasion Techniques
How Antivirus Works
Antivirus Evasion Techniques
Understanding Endpoint Detection and Response (EDR)
EDR Evasion Techniques
Application Control Bypass
Windows Control Evasion Techniques
Software Control Evastion Techniques
Understanding Malwares
Malware Evasion Techniques
Anti-Malware Evasion Control Techniques
Height:
Width:
Spine:
Weight:0.00