Evading Logging and Monitoring
Introduction

Event Tracing



Approaches to Log Evasion


Tracing Instrumentation


Reflection for Fun and Silence



Patching Tracing Function






Providers via Policy



Group Policy Takeover



Abusing Log Pipeline

Real World Scenario


Conclusion

Last updated