Summary
In this chapter, we delved into the intricate world of offensive tactics, where threat actors skillfully exploit communication channels and turn the very features of OSs against them, establishing a covert presence within compromised systems. Let’s recap the key topics covered, complemented by hands-on code examples and real-life scenarios:
- The foundation of the evasion life cycle: We explored the fundamental principles that underscore the life cycle of evasion, providing insights into the strategic planning and execution employed by offensive actors.
- Function hooking DLLs and how to evade them: We provided a detailed exploration of how attackers utilize function hooking in DLLs and practical strategies to evade detection, showcasing the cat-and-mouse game between attackers and endpoint security.
- Event Tracing for Windows (ETW) and how to bypass it: We provided a comprehensive look into evading detection through ETW, shedding light on techniques employed...