SDF: Persistence Fast Triage

- 78%

0
Certificate

Paid

Language

Level

Beginner

Last updated on March 17, 2025 2:15 pm

Learn how to quickly triage Windows systems for evidence of compromise and uncover persistence mechanisms using key artifacts and Splunk logic.

Add your review

What you’ll learn

  • Learn how to triage Windows systems for evidence of compromise quickly
  • Learn about key artifacts used for targeted persistence analysis
  • Learn Splunk logic for fast triage
  • Learn by doing – practical exercises – basic python with some powershell
  • Learn by doing – practical exercises – convert EVTX files to CSV with open-source tools

Research conducted on malicious campaigns found the successful establishment of a persistence mechanism(s) necessary for the attacker to achieve their goals. Installing persistence is a choke point in the attack method and provides an opportunity for detection through the analysis of affected system artifacts.

The identification of a compromised system is a high priority. Discovering the compromise early during an investigation improves scoping, containment, mitigation, and remediation efforts. If persistence is not detected, it may reduce the perceived risk of the system. Either finding is valuable for making resource assignment decisions.

This class teaches you how to utilize readily available artifacts to uncover persistence mechanisms quickly. Each module breaks down the artifact from a DFIR point of view, identifying key elements and analysis strategy guidelines along the way. Just about any forensic platform or security appliance may be used once you understand how to approach the artifact. Splunk is used to provide SIEM logic examples. Open-source tools, with a little python scripting, is used for the practical exercises. The completed python scripts are provided as well.

The main artifact categories covers evidence that appears in investigations repeatedly:

  • Windows event logs for services

  • Windows event logs for scheduled tasks

  • Windows registry autoruns and registry modification events.

Who this course is for:

  • New security incident response analysts
  • New SOC analysts
  • New threat hunters
  • Students
  • DFIR professionals

User Reviews

0.0 out of 5
0
0
0
0
0
Write a review

There are no reviews yet.

Be the first to review “SDF: Persistence Fast Triage”

×

    Your Email (required)

    Report this page
    SDF: Persistence Fast Triage
    SDF: Persistence Fast Triage
    LiveTalent.org
    Logo
    LiveTalent.org
    Privacy Overview

    This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.