It seems that every month there is a new security startup that advocates some new Machine Learning algorithm to detect "malicious" requests. 99% of them are full of shit. However, that last 1% can be a real threat to your regular "mass-mimikatz", "pass-the-hash", "pass-the-ticket", and so on.
I decided to write a book on the subject: How to Hack Like a Legend that walks you through the different tips and techniques to bypass these Machine Learning Tools. You get to shadow a hacker pwning an Offshore company through one of their suppliers. Zero bullshit. Practical attacks and code! We will look at:
How to Bypass AMSI and PowerShell Constrained mode
How to Bypass Microsoft ATA and MS ATP
Kerberoasting
C# Reflection and how to use it to bypass EDR (Endpoint Detection Response) Tools
Lots of good and up to date stuff to keep up with security vendors and new Windows 10 protections. The book is for hackers and pentesters who want to take it a step further.
It seems that every month there is a new security startup that advocates some new Machine Learning algorithm to detect "malicious" requests.
99% of them are full of shit. However, that last 1% can be a real threat to your regular "mass-mimikatz", "pass-the-hash", "pass-the-ticket", and so on.
I decided to write a book on the subject: How to Hack Like a Legend that walks you through the different tips and techniques to bypass these Machine Learning Tools.
You get to shadow a hacker pwning an Offshore company through one of their suppliers. Zero bullshit. Practical attacks and code!
We will look at:
How to Bypass AMSI and PowerShell Constrained mode
How to Bypass Microsoft ATA and MS ATP
Kerberoasting
C# Reflection and how to use it to bypass EDR (Endpoint Detection Response) Tools
Lots of good and up to date stuff to keep up with security vendors and new Windows 10 protections.
The book is for hackers and pentesters who want to take it a step further.
Cheers,