-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Incident Response for Windows
By :

As you already know, the process of getting a foothold on a system is often accompanied by privilege escalation, defense evasion, or credential access. The techniques used to achieve these goals have quite a lot of overlap and, as a result, similar methods of analysis.
The sources where you can find traces of the techniques used can be divided into several main groups:
Let’s look at ways to analyze each of the preceding groups and the corresponding traces of the techniques of persistence, defense evasion, privilege escalation, and credential access.
Windows event logs are one of the sources that can help you find traces of persistence. Event logs can store data about a new service installed on a system, information about creating, enabling, or modifying user accounts, new scheduled tasks, and Background Intelligent Transfer Service...
Change the font size
Change margin width
Change background colour