Red Team Techniques for Evading, Bypassing & Disabling MS
Red Team Techniques for Evading, Bypassing, and Disabling MS Advanced Threat Protection and Advanced Threat Analytics
Windows Defender Advanced Threat Protection is now available for all Blue Teams to utilize within Windows 10 Enterprise and Server 2012/16, which includes detection of post breach tools, tactics and techniques commonly used by Red Teams, as well as behavior analytics.
By Chris Thompson
Full Abstract & Presentation Materials:
https://www.blackhat.com/eu-17/briefings.html#red-team-techniques-for-evading-bypassing-and-disabling-ms-advanced-threat-protection-and-advanced-threat-analytics
Видео Red Team Techniques for Evading, Bypassing & Disabling MS канала Black Hat
Windows Defender Advanced Threat Protection is now available for all Blue Teams to utilize within Windows 10 Enterprise and Server 2012/16, which includes detection of post breach tools, tactics and techniques commonly used by Red Teams, as well as behavior analytics.
By Chris Thompson
Full Abstract & Presentation Materials:
https://www.blackhat.com/eu-17/briefings.html#red-team-techniques-for-evading-bypassing-and-disabling-ms-advanced-threat-protection-and-advanced-threat-analytics
Видео Red Team Techniques for Evading, Bypassing & Disabling MS канала Black Hat
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Writing Bad @$$ Malware For OS XYou’re Probably Not Red Teaming... And Usually I’m Not, Either [SANS ICS 2018]Privilege Escalation FTWIntroducing Pwncat: Automating Linux Red Team OperationsAirBnBeware: Short Term Rentals Long Term PwnageMicah Zenko - Red Teaming Insights and Examples from Beyond - DEF CON 27 Social Engineering VillageICS SCADA Red Teaming WebinarMITRE ATT&CK: The Play at Home EditionSo You Want to Red Team? - Lawrence Munro & Matt Lorentzen at 44CON 201848 Dirty Little Secrets Cryptographers Don’t Want You To KnowWWHF 2020 (Virtual): Breaking Into Banks Like A Boss! - Brice SelfDay 1 Keynote: National Cyber-Aggression and Private-Sector Internet InfrastructureWhat Event Logs? Part 1: Attacker Tricks to Remove Event LogsBlack Hat Asia 2014 - The Machines That Betrayed Their MastersSkyDogCON 2013: Android Phones Can Do That?!? - Deviant OllamHD Moore on Modern Network Discovery - Duo Tech TalkIn-Depth SILENTTRINITY Demo, Explanation & Walkthrough!Why Most Cyber Security Training Fails and What We Can Do About itHacking Common AD MisconfigurationsCrikeyCon 2019 - Christopher Vella - Reversing & bypassing EDRs