У нас вы можете посмотреть бесплатно (Podcast) Shadow Persistence Unlocked The RecoverIt Tool Deep Dive или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
(Podcast) Shadow Persistence Unlocked The RecoverIt Tool Deep Dive Ever wonder if your Windows "Recovery" settings are actually working for the bad guys? 🧐 In today’s episode, we’re breaking down *RecoverIt**, a game-changing open-source offensive security tool developed by researcher **TwoSevenOneT**. This isn't your average registry tweak; we’re talking about a stealthy way to weaponize the built-in **failure recovery mechanism* of Windows Services to bypass EDR detection and execute arbitrary code. 🛠️🚫🛡️ We explore how this tool ditches the heavily monitored `ImagePath` and goes straight for the *"Recovery" tab* blind spot, modifying `FailureCommand` and `FailureActions` configurations instead. 🕵️♂️ Learn how services like **UevAgentService**—which is prone to crashing if the broader UE-V service is disabled—are being used as reliable triggers for malicious payloads like **Cobalt Strike beacons**. Because these actions are spawned directly by `services.exe`, they blend right into legitimate background activity. 💻 If you're a *Red Teamer* looking for fresh lateral movement tactics or a *Defender* trying to close the gap on service recovery exploits, this one is for you! 🎧 We discuss why standard event logs might fail to detail the malicious program launched during a crash and why you need to start monitoring specific registry key modifications right now. 🔍🔥 Source: Guru Baran, Cyber Security News (cybersecuritynews.com) #CyberSecurity #RecoverIt #RedTeaming #WindowsSecurity #InfoSec #EDRBypass #PenetrationTesting #ThreatHunting #MalwarePersistence #EthicalHacking