Blasting Event Driven Cornucopia: WMI based User Space Attacks Blind SIEMs and EDRs
Security solutions engineers always find new ways to monitor OS events to mitigate threats on endpoints. These approaches typically reuse different builtin Windows mechanisms that were never designed with security first in mind. At Black Hat Europe 2021, we publicly showed how to blind an entire class of endpoint security products by disabling ETW. Our current research focus is Windows Management Instrumentation (WMI), a mechanism that allows filtering without registering kernel By: Andrey Golchikov, Igor Korkin, Claudiu Teodorescu Full Abstract Presentation Materials:
|
|