October 2023
Intermediate to advanced
312 pages
8h 26m
English
So far, we’ve covered the design of EDRs, the logic of their components, and the internal workings of their sensors. Still, we’ve missed one critical piece of the puzzle: how to apply this information in the real world. In this final chapter, we’ll systematically analyze the actions we’d like to take against target systems and determine our risk of being detected.
We’ll target a fictional company, Binford Tools, inventor of the Binford 6100 left-handed screwdriver. Binford has asked us to identify an attack path from a compromised user workstation to a database holding the proprietary design information ...
Read now
Unlock full access