Room progress ( 0% )
Task 1Introduction
Task includes a deployable machine
Task 2Event Tracing
Task 3Approaches to Log Evasion
Task 4Tracing Instrumentation
Task 5Reflection for Fun and Silence
Task 6Patching Tracing Functions
Task 7Providers via Policy
Task 8Group Policy Takeover
Task 9Abusing Log Pipeline
Task 10Real World Scenario
Task includes a deployable machine
Task 11Conclusion
Ready to learn Cyber Security? Create your free account today!
The Evading Logging and Monitoring room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in