October 2023
Intermediate to advanced
312 pages
8h 26m
English
For years, Microsoft Defender for Endpoint (MDE) presented a huge challenge for offensive security practitioners because it could detect issues that all the other EDR vendors missed. One of the primary reasons for its effectiveness is its use of the Microsoft-Windows-Threat-Intelligence (EtwTi) ETW provider. Today, developers who publish ELAM drivers use it to access some of the most powerful detection sources on Windows.
Despite its name, this ETW provider won’t provide you with attribution information. Rather, it reports on events that were previously unavailable to EDRs, like memory allocations, ...
Read now
Unlock full access