Registry Run Keys
Many organizations do not monitor for additions to the Windows Registry that could be used to trigger autostart execution on system boot or logon. This allows adversaries to launch programs that run at higher privileges and paves the way for more damaging activity. Learn how to detect and mitigate this activity to secure your network.
Course Description
Once adversaries have taken advantage of the Registry Run Keys technique, they can take a look around and elevate their privileges to gain more access and achieve persistence. Threat actors like FIN10 have been known to establish persistence by using the Registry option in PowerShell Empire to add a Run key.
It’s important to mitigate this activity and block potentially malicious software that may be executed through run key or upon startup.
Get the hands-on skills you need to detect and mitigate this type of attack in Cybrary’s MITRE ATT&CK Framework courses aligned to the tactics and techniques used by the financially motivated threat group FIN10. Prevent adversaries from accomplishing the tactic of Persistence in your environment today.
What will I be able to accomplish after taking these courses?
What are the prerequisites for these courses?
What are the prerequisites for these courses?
Intermediate-level knowledge of defensive security is required. You should have some experience as a security engineer, SOC or security analyst, or similar role.
Familiarity with using a SIEM tool, like Splunk or ELK is strongly recommended.
Module 1: Registry Run Keys
There are no reviews yet.