Evading Logging and Monitoring

Introduction

Event Tracing

Approaches to Log Evasion

Tracing Instrumentation

Reflection for Fun and Silence

Patching Tracing Function

Providers via Policy

Group Policy Takeover

Abusing Log Pipeline

Real World Scenario

Conclusion

Last updated