Gain expertise in primary evasion techniques by studying notable examples and analyzing the leading security and response solutions available in the market.
Key Features
- Gain a thorough understanding of the inner workings of Windows
- Discover evasion techniques that have been uncovered by researchers in crucial security controls
- Learn about bypass methods employed in network security tools and how to counteract them
Book Description
Defense evasion techniques refer to methods used by attackers to evade detection by security measures and avoid being blocked or removed from a targeted system or network. The book will address Defense Evasion concepts and techniques and will focus on topics like antivirus, EDR, Firewalls, Application Controls, WAF, and finally methods used by malware to avoid reverse engineering and other security controls. The readers will find it very helpful in understanding Security Concept Basics, Windows APIs and Sysinternals. By the end of the book the readers will be comfortable securing their environments by understanding their security measures and detections against those who try to fly under the radar.What you will learn
- Learn the methods attackers use to evade detection and infiltrate systems and networks
- Dissect advanced evasion techniques uncovered by researchers in critical security controls
- Understand bypass methods used in network security tools and how to counteract them
- Deep dive into primary evasion techniques used by malware and how to defend against them
- Understand security concept basics, Windows APIs, and Sysinternals
- Enhance knowledge of antivirus, EDR, firewalls, and application controls
- Learn techniques for preventing reverse engineering and other security controls
- Prepare effective detection and prevention of covert attacks to secure environments
Who this book is for
The primary audience include job roles like penetration testers, security researchers, security analysts and Red & Blue teams. The secondary audience include cybersecurity students, professionals, PEN-300 aspirants, and any software developer working on security products and want to get skills with defense evasion in many layers.
Share This eBook: