This session will delve into an emerging advanced technique designed to bypass Endpoint Detection and Response (EDR) systems. This technique enables attackers to conceal their malicious activities and evade EDR monitoring and detection by leveraging low-level Windows APIs and manipulating system call user-mode hooking mechanisms. By doing so, attackers can bypass traditional EDR defenses, evade file scanning, behavior monitoring, and other protective measures, while establishing persistent control.
TOPIC / TRACK
Offensive Security Forum
LOCATION
Taipei Nangang Exhibition Center, Hall 2
7F 701F
LEVEL
Advanced Advanced sessions explore
cybersecurity topics, including
architecture, tools, practical experiences, and strategy
comparisons. Content often features code explanations,
protocol analysis, reverse engineering, live demos, and is
suitable for experienced cybersecurity
professionals.
SESSION TYPE
Breakout Session
LANGUAGE
Chinese
SUBTOPIC
Endpoint Detection & Response
Endpoint Security
Penetration Testing
CYBERSEC 2025 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy 。