Anartz Martin leads our second workshop on attack detection code execution and persistence tactics. Follow along with demos that illustrate the techniques used by attackers in the wild to:
- Run malicious code to gain foothold on a target’s system (code execution)
- Maintain this system access consistently through reboots, credential changes, and other operational interruptions (persistence)
- Consultants will also cover how code execution and persistence can be detected before attackers advance further down the kill chain.
You can find the workshop guides over on the F-Secure Labs website:
Lab guide 1: https://labs.f-secure.com/blog/attack-detection-fundamentals-code-execution-and-persistence-lab-1
Lab guide 2: https://labs.f-secure.com/blog/attack-detection-fundamentals-code-execution-and-persistence-lab-2