A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


How do I detect technique X in Windows?? Applied Methodology to Definitively Answer this Question - Matt Graeber Derbycon 2019 (Hacking Illustrated Series InfoSec Tutorial Videos)

How do I detect technique X in Windows?? Applied Methodology to Definitively Answer this Question
Matt Graeber
Derbycon 2019

Traditionally, the answer to this question has been to execute an attack technique in a controlled environment and to observe relevant events that surface. While this approach may suffice in some cases, ask yourself the following questions: ?Will this scale? Will this detect current/future variants of the technique? Is this resilient to bypass?? If your confidence level in answering these questions is not high, it?s time to consider a more mature methodology for identifying detection data sources. With a little bit of reverse engineering, a defender can unlock a multitude of otherwise unknown telemetry. This talk will establish a methodology for identifying detection data sources and will cover concepts including Event Tracing for Windows, WPP, TraceLogging, and security product analysis.

Matt Graeber, a researcher at SpecterOps is an attacker and vulnerability researcher at heart who has fully embraced detection engineering as a discipline not only to improve the state of security but to also enable continuous offensive maturity. Matt is a naive security optimist who believes that the future of security is bright. He also spends much of his time pondering the concept of trust, how it applies to Infosec, and how automation can be applied to a mature definition of it. Lastly, Matt enjoys giving and receiving warm, welcoming hugs.

@mattifestation

Back to Derbycon 2019 video list

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast