Book description
Nearly every enterprise uses an Endpoint Detection and Response (EDR) agent to monitor the devices on their network for signs of an attack. But that doesn't mean security defenders grasp how these systems actually work. This book demystifies EDR, taking you on a deep dive into how EDRs detect adversary activity. Chapter by chapter, you’ll learn that EDR is not a magical black box—it’s just a complex software application built around a few easy-to-understand components.
The author uses his years of experience as a red team operator to investigate each of the most common sensor components, discussing their purpose, explaining their implementation, and showing the ways they collect various data points from the Microsoft operating system. In addition to covering the theory behind designing an effective EDR, each chapter also reveals documented evasion strategies for bypassing EDRs that red teamers can use in their engagements.
Publisher resources
Table of contents
- Praise for Evading EDR
- Title Page
- Copyright
- Dedication
- About the Author and Technical Reviewer
- Acknowledgments
- Introduction
- 1. EDR-chitecture
- 2. Function-Hooking DLLs
- 3. Process- and Thread-Creation Notifications
- 4. Object Notifications
- 5. Image-Load and Registry Notifications
- 6. Filesystem Minifilter Drivers
- 7. Network Filter Drivers
- 8. Event Tracing for Windows
- 9. Scanners
- 10. Antimalware Scan Interface
- 11. Early Launch Antimalware Drivers
- 12. Microsoft-Windows-Threat-Intelligence
- 13. Case Study: A Detection-Aware Attack
- Appendix. Auxiliary Sources
- Index
Product information
- Title: Evading EDR
- Author(s):
- Release date: October 2023
- Publisher(s): No Starch Press
- ISBN: 9781718503342
You might also like
book
Adversary Emulation with MITRE ATT&CK
By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced …
book
Kubernetes: Up and Running, 3rd Edition
In just five years, Kubernetes has radically changed the way developers and ops personnel build, deploy, …
video
CompTIA Security+ SY0-701
27+ Hours of Video Instruction Get the edge you need to successfully study for the CompTIA …
book
System Design on AWS
Enterprises building complex and large-scale applications in the cloud face multiple challenges. From figuring out the …