October 2023
Intermediate to advanced
312 pages
8h 26m
English
Nearly every EDR solution includes a component that accepts data and tries to determine whether the content is malicious. Endpoint agents use it to assess many different data types, such as files and memory streams, based on a set of rules that the vendor defines and updates. This component, which we’ll refer to as the scanner for simplicity’s sake, is one of the oldest and best-studied areas in security from both the defensive and offensive angles.
Because covering all aspects of their implementation, processing logic, and signatures would be like trying to boil the ocean, this chapter focuses on the rules employed by file-based ...
Read now
Unlock full access