
⚙️ Endpoint Evasion Lessons Learned
Abstract This post dissects a subtle technique observed in post-exploitation phases where adversaries bypass common endpoint detection and response (EDR) hooks. We move beyond simple API hooking to examine memory artifact manipulation techniques that often slip past heuristic scanning. The focus is on practical application for threat hunters and defenders. High Retention Hook I remember staring at a seemingly clean process dump, convinced the malware process had vanished. My initial assumption was a sloppy cleanup or an in memory execution that terminated cleanly. It took three days and a deep dive into kernel debugging reveals to see the residual artifact—a ghost process lingering just long enough for C2 beaconing, deliberately coded to evade standard process enumeration tools. It was a frustrating, yet clarifying, lesson in attacker patience. Research Context The modern threat landscape demands adversaries move beyond relying on easily signatured binaries. Fileless malware and in mem
Continue reading on Dev.to DevOps
Opens in a new tab




