Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

In NTDLL I Trust - Process Reimaging and Endpoint Security Solution Bypass - E. Carroll - Hack in Paris - 2019

Hack in Paris via YouTube

Overview

This course teaches learners how to utilize the Process Reimaging technique to bypass Windows Defender detection and achieve the same impact as Process Hollowing or Process Doppelganging. The course covers reversing vulnerable Windows Kernel APIs, understanding attack vectors, and providing recommendations for protecting Endpoint Products against Process Reimaging. The intended audience for this course includes cybersecurity professionals interested in endpoint security solutions and defense evasion techniques.

Syllabus

Introduction
Relevance
attribution
about me
Agenda
What is Process Reimaging
AV Scanners
Process Reimaging
Mitre Attack Framework
Game of Thrones
Process Doppelganger
AP
Process Re Imaging
Weaponized Process Re Imaging
Summary
Image File Pointer Field
Summary Table
Attack vectors
Get process image
Run process
Rename process
Demo
Recap
Pros and Cons
Impact
Endpoint Security Solution
Protection Recommendations
Microsoft Update
Conclusion

Taught by

Hack in Paris

Reviews

Start your review of In NTDLL I Trust - Process Reimaging and Endpoint Security Solution Bypass - E. Carroll - Hack in Paris - 2019

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.