YoVDO

Windows EventLog Persistence Techniques for Red Team Operations

Offered By: BSidesLV via YouTube

Tags

Windows Security Courses Privilege Escalation Courses Windows Event Logs Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced Windows exploitation techniques in this 32-minute conference talk from BSidesLV. Delve into three innovative methods for bypassing security measures and maintaining persistence in Windows environments during red team operations. Learn how to circumvent constrained language using run space with C# code, exploit XML files for privilege escalation to NT\AUTHORITY, and leverage Windows EventLog for undetectable persistence through HEX shellcode storage. Gain insights into offensive strategies that challenge built-in protection mechanisms like Applocker, and discover potential detection and mitigation approaches for defensive teams.

Syllabus

GroundFloor, Tue, Aug 6, 20:00 - Tue, Aug 6, CDT


Taught by

BSidesLV

Related Courses

Cybersecurity Roles, Processes & Operating System Security
IBM via Coursera
Operating Systems and Security
IBM via edX
Hacking in Practice: Intensive Ethical Hacking MEGA Course
Udemy
The Complete Cyber Security Course : Hackers Exposed!
Udemy
Learning Computer Security and Internet Safety
LinkedIn Learning