Windows EventLog Persistence Techniques for Red Team Operations
Offered By: BSidesLV via YouTube
Course Description
Overview
Explore advanced Windows exploitation techniques in this 32-minute conference talk from BSidesLV. Delve into three innovative methods for bypassing security measures and maintaining persistence in Windows environments during red team operations. Learn how to circumvent constrained language using run space with C# code, exploit XML files for privilege escalation to NT\AUTHORITY, and leverage Windows EventLog for undetectable persistence through HEX shellcode storage. Gain insights into offensive strategies that challenge built-in protection mechanisms like Applocker, and discover potential detection and mitigation approaches for defensive teams.
Syllabus
GroundFloor, Tue, Aug 6, 20:00 - Tue, Aug 6, CDT
Taught by
BSidesLV
Related Courses
OS Analysis with HELKPluralsight Building PowerShell Security Tools in a Windows Environment
Pluralsight Threat Hunting with Windows Event Forwarding
Cybrary Windows Event Logs - Zero to Hero
YouTube Windows Event Logs - Zero to Hero
YouTube