Главная
Study mode:
on
1
Intro
2
Why operate in the shadows
3
Security is improving
4
Identifying controls
5
Situational awareness
6
Privilege
7
Security Controls
8
Security Center
9
Antivirus Products
10
Antivirus Modules
11
Controls
12
Audit Policy
13
C Program
14
Meterpreter
15
Process Creation Include Command Line
16
Commercial Products
17
System On Entry
18
System On Migration
19
Whitelisting
20
PowerShell Controls
21
Centralized Login
22
Control Noise
23
Footprint
Description:
Explore advanced techniques for operating covertly in cybersecurity environments in this 52-minute conference talk from Derbycon 2015. Delve into the reasons behind shadow operations, the evolving landscape of security measures, and methods for identifying and navigating various controls. Gain insights on situational awareness, privilege escalation, and understanding security centers and antivirus products. Learn about audit policies, C programming, Meterpreter usage, and process creation. Examine commercial products, system entry and migration strategies, whitelisting techniques, PowerShell controls, and centralized login processes. Master the art of minimizing control noise and reducing operational footprints for more effective covert operations.

Operating in the Shadows

Add to list
0:00 / 0:00