• Home
  • Search
  • Map
  • Resources
    Technique List Snippet List Detection Rule List
  • About
  • API

Search Evasion Techniques

Names, Techniques, Definitions, Keywords

Random is cool

Search Result

1 item(s) found so far for this keyword.

Windows Event Log Evasion via Native APIs Anti-Forensic

Attackers can leverage native Windows API calls to install malicious services without generating correlating entries in the event log. Using native APIs to install services instead of the standard API calls allow attackers to bypass security controls and event logging. This technique was utilised by Stuxnet.

Services are typically created through a standard Windows API call CreateServiceA or CreateService. …

Made with in 🇫🇷 © 2022. The #UnprotectProject

Terms And Conditions

Contribute