Username: Evidence Muvindi



Download 333.16 Kb.
View original pdf
Page3/4
Date11.11.2022
Size333.16 Kb.
#59934
1   2   3   4
edr test security assessment detailed report 2022 10 16 16 12
USER PRIVILEGES HOSTNAME
IP ADDRESS
OS
GROUP
LAST RUN

SYSTEM
acad2753-un
172.16.14.57
Microsoft
Windows 10 Pro
N
10/16/2022 04:13 pm

SYSTEM
acad3485-prot
172.16.15.39
Microsoft
Windows 10 Pro
N
10/16/2022 04:13 pm

PHASE RESULTS BY SCENARIO RUN 04:12 pm
On asset acad2753-un
(172.16.14.57)
Phase
Outcome
Mitigation Recommendations
Persistence Through Startup Folder
Install or Verify Advanced Endpoint Security Technologies
Monitor and/or block anomalous registry changes
Employ Registry Protection Techniques 04:12 pm
On asset acad3485-prot
(172.16.15.39)
Phase
Outcome
Mitigation Recommendations
Persistence Through Startup Folder
Install or Verify Advanced Endpoint Security Technologies
Monitor and/or block anomalous registry changes
Employ Registry Protection Techniques
Failed
Failed

PERSISTENCE THROUGH WINDOWS REGISTRY SCENARIO RESULTS Detailed description, results and mitigation recommendations for this scenario.
D ES CR IPT ION PERSISTENCE THROUGH WINDOWS REGISTRY
Many types of malware attempt to achieve persistence by creating or modifying Windows Registry key entries.
These entries allow malware to load a malicious executable or DLL when a certain system action is carried out,
usually on startup, but also when the browser is opened, or a certain type of leis accessed.
This scenario mimics registry-based techniques that malware use in order to achieve persistence in compromised systems. By creating the following registry keys, attackers would be able to automatically execute malicious binaries on system reboot or when other programs are executed, allowing them to keep the system compromised. It is important fora security analyst to keep track of the following registry entries and monitor them so only legitimate software is using them.
The scenario will attempt to create these registry entries, and if successful, remove them immediately. If the registry keys are created, the attack will beset as successful. The attack will beset as failed otherwise.

SCENARIO RESULTS BY ASSET LAST RUN)

Download 333.16 Kb.

Share with your friends:
1   2   3   4




The database is protected by copyright ©ininet.org 2024
send message

    Main page