Gain a Splash of New Skills - Coursera+ Annual Nearly 45% Off
Foundations for Product Management Success
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
In this 19-minute cybersecurity video, learn how to hunt for evidence of adversaries establishing persistence in your environment with Andrew Prince from Cyber Mentor. Discover the telltale signs of malware implants and common persistence techniques hackers use. The tutorial covers critical areas including autostart locations, hunting run keys, Windows services, service failure recovery abuse, scheduled tasks, and WMI event consumers. Follow along with practical demonstrations of creating and hunting WMI event consumer backdoors, complete with code examples. Gain valuable threat hunting skills that build on concepts covered in SOC 101, helping security professionals detect intrusions more effectively by understanding these common persistence methods used by attackers.
Syllabus
0:00 - Introduction
0:38 - Autostart Locations
3:30 - Hunting Run Keys
5:49 - Windows Services
9:09 - Abusing Service Failure Recovery
10:15 - Scheduled Tasks
11:03 - Hunting Scheduled Tasks
11:58 - WMI Event Consumers
14:37 - Creating and Hunting WMI Event Consumer Backdoors
18:21 - Conclusion
Taught by
The Cyber Mentor