On Mon, May 11, 2015 at 12:20 PM, Dave Aitel <[email protected]> wrote:

>
> And I don't know any modern HIDS company willing to offer a solution that
> they would claim is resilient against an attacker who already has access to
> the platform and can prepare counter-measures. This is, as the NSA might
> put it, a "somewhat challenging problem to attack".
>
>
You know, this question bugged me all the time while I was researching what
we now call "the EDR space." How can those agents co-exist with "advanced"
attacker on the same endpoint and still deliver useful telemetry?  It
turned out that SOME of the vendors have in fact thought about it long and
hard, and the list of tricks they use to keep reporting from the owned
endpoint is long indeed.  On the other hand, sad hilarity ensues when some
formerly IT ops focused endpoint agents are repurposed for "APT IR"....

-- 
Dr. Anton Chuvakin
Site: http://www.chuvakin.org
Twitter: @anton_chuvakin <https://twitter.com/anton_chuvakin>
Work: http://www.linkedin.com/in/chuvakin
_______________________________________________
Dailydave mailing list
[email protected]
https://lists.immunityinc.com/mailman/listinfo/dailydave

Reply via email to