Explore advanced techniques for circumventing Network Behavior Anomaly Detection (NBAD) and User and Entity Behavior Analytics (UEBA) in this informative conference talk from GrrCON 2019. Delve into the fundamentals of intrusion detection, anomaly detection, and security operations before examining sophisticated methods of data poisoning, exfiltration, and initial access. Learn about innovative approaches such as pump dump, Docker exploitation, and network bridging. Witness a live demonstration of nonrepudiation techniques, sampling, and TLS manipulation. Gain insights into REST API vulnerabilities, network scanning, and baseline manipulation to enhance your understanding of cybersecurity challenges and defenses.