$43.49 sale price when purchased online
$59.99 list price
Target Online store #3991
About this item
Highlights
- EDR, demystified!
- About the Author: Matt Hand is an experienced red team operator with over a decade of experience.
- 312 Pages
- Computers + Internet, Security
Description
About the Book
"Introduces readers to the most common components of EDR systems, including function hooking, callback notifications, Event Tracing for Windows, and filesystem minifilters, by explaining how they are implemented and how they collect various data points. Covers documented evasion strategies for bypassing detections and describes how defenders might protect themselves"--Book Synopsis
EDR, demystified! Stay a step ahead of attackers with this comprehensive guide to understanding the attack-detection software running on Microsoft systems--and how to evade it. Nearly every enterprise uses an Endpoint Detection and Response (EDR) agent to monitor the devices on their network for signs of an attack. But that doesn't mean security defenders grasp how these systems actually work. This book demystifies EDR, taking you on a deep dive into how EDRs detect adversary activity. Chapter by chapter, you'll learn that EDR is not a magical black box--it's just a complex software application built around a few easy-to-understand components. The author uses his years of experience as a red team operator to investigate each of the most common sensor components, discussing their purpose, explaining their implementation, and showing the ways they collect various data points from the Microsoft operating system. In addition to covering the theory behind designing an effective EDR, each chapter also reveals documented evasion strategies for bypassing EDRs that red teamers can use in their engagements.Review Quotes
"A great book for red and blue [people]! It is a great resource for anyone who wants to learn more about how EDRs work and Windows internals with a security perspective."
--Olaf Hartong, @olafhartong, researcher at FalconForce "If you spend any time around EDR's, or are just interested in how they work... this book is an invaluable addition to your collection."
--Adam Chester, @_xpn_, RedTeamer at TrustedSec "A masterclass in understanding EDR internals...a very relevant handbook for both attackers and defenders to learn about the strengths, but also limitations and blind spots of EDR software."
--Arris Huijgen, @bitsadmin
About the Author
Matt Hand is an experienced red team operator with over a decade of experience. His primary areas of focus are in vulnerability research and EDR evasion where he spends a large amount of time conducting independent research, developing tooling, and publishing content. Matt is currently a Service Architect at SpecterOps where he focuses on improving the technical and execution capabilities of the Adversary Simulation team, as well as serving as a subject matter expert on evasion tradecraft.Dimensions (Overall): 9.2 Inches (H) x 6.9 Inches (W) x .9 Inches (D)
Weight: 1.14 Pounds
Suggested Age: 22 Years and Up
Number of Pages: 312
Genre: Computers + Internet
Sub-Genre: Security
Publisher: No Starch Press
Theme: Networking
Format: Paperback
Author: Matt Hand
Language: English
Street Date: October 31, 2023
TCIN: 1003470321
UPC: 9781718503342
Item Number (DPCI): 247-20-0448
Origin: Made in the USA or Imported
Shipping details
Estimated ship dimensions: 0.9 inches length x 6.9 inches width x 9.2 inches height
Estimated ship weight: 1.14 pounds
We regret that this item cannot be shipped to PO Boxes.
This item cannot be shipped to the following locations: American Samoa (see also separate entry under AS), Guam (see also separate entry under GU), Northern Mariana Islands, Puerto Rico (see also separate entry under PR), United States Minor Outlying Islands, Virgin Islands, U.S., APO/FPO
Return details
This item can be returned to any Target store or Target.com.
This item must be returned within 90 days of the date it was purchased in store, shipped, delivered by a Shipt shopper, or made ready for pickup.
See the return policy for complete information.