Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Morphing to Legitimate Behavior Attack Patterns

via YouTube

Overview

Explore advanced attack patterns that mimic legitimate behavior in this conference talk by Dave Kennedy at GrrCON 2017. Delve into the concept of "Ghast07 Morphing," a sophisticated technique used by attackers to evade detection by blending malicious activities with normal system operations. Learn how these attack patterns work, their potential impact on cybersecurity, and strategies to identify and mitigate such threats. Gain valuable insights into the evolving landscape of cyber attacks and enhance your ability to protect against these stealthy intrusion methods.

Syllabus

Ghast07 Morphing to Legitimate Behavior Attack Patterns Dave Kennedy

Reviews

Start your review of Morphing to Legitimate Behavior Attack Patterns

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.