Главная
Study mode:
on
1
Intro
2
Who am I
3
How we got here
4
Methodology
5
Atomic Red Team
6
Malware
7
MS Venom
8
Not PowerShell NPS
9
Results
10
Conclusions
11
Vendor Claims
12
Clear Winner
13
Configuration Changes
14
False Positives
15
Did we have anything additional
16
Can the end point solution catch it
17
Can we bypass it
18
Can we cripple it
19
Test environment
20
Automation
21
Standard User
22
Containment
23
Success Failure
24
Does NDA Expire
25
Vendors Watching
26
Did the vendors threaten legal action
27
Did they know I was going to talk about Next Gen AV
Description:
Explore endpoint protection testing and next-generation antivirus bypass techniques in this 42-minute conference talk from Derbycon 2019. Delve into Kevin Gennuso's methodology, covering topics such as Atomic Red Team, malware, and MS Venom. Learn about vendor claims, configuration changes, false positives, and test environments. Discover insights on containment, automation, and standard user scenarios. Gain understanding of success and failure metrics, NDA considerations, and vendor reactions to testing. Uncover the intricacies of evaluating endpoint security solutions and their effectiveness against modern threats.

Testing Endpoint Protection - How Anyone Can Bypass Next Gen AV

Add to list
0:00 / 0:00