YoVDO

Windows Event Log Persistence Techniques - Bypassing Protections and Maintaining Access

Offered By: Ekoparty Security Conference via YouTube

Tags

Windows Security Courses Penetration Testing Courses Privilege Escalation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced Windows persistence techniques and bypass methods in this conference talk from Ekoparty 2023. Delve into red team operations and penetration testing strategies for Windows environments, focusing on leveraging the operating system itself as an ally. Learn about bypassing Constrained Language Mode, elevating privileges using WIX files, and achieving persistence through Windows Event Log manipulation. Discover how to remain undetectable by Windows Defender while executing these techniques in a controlled lab environment with protection mechanisms like AppLocker in place. Gain insights into creating custom scripts, exploiting Windows Installer packages, and abusing event logs for payload execution. Understand the phases of a red team operation, from initial reconnaissance to maintaining long-term access, all while using Windows components to your advantage.

Syllabus

The windows is our friend!!! Windows Event Log Persistence - Fabricio Gimenes - Ekoparty 2023


Taught by

Ekoparty Security Conference

Related Courses

Cybersecurity Roles, Processes & Operating System Security
IBM via Coursera
Operating Systems and Security
IBM via edX
Hacking in Practice: Intensive Ethical Hacking MEGA Course
Udemy
The Complete Cyber Security Course : Hackers Exposed!
Udemy
Learning Computer Security and Internet Safety
LinkedIn Learning