Click any tag below to further narrow down your results
Links
This article discusses how threat actors can exploit the Bind Link API in Windows 11 to redirect EDR folders to locations under their control, allowing them to tamper with EDR operations. It details a proof of concept tool called EDR-Redir that demonstrates this technique and highlights detection strategies for security teams.
Exploring remote EDR capabilities without traditional agents, the author demonstrates how to utilize Performance Logs and Alerts APIs for stealthy monitoring of security events on target systems. This method allows both offensive and defensive teams to enhance their visibility while avoiding the complexities of agent deployment.