Sedating the Watchdog - Abusing Security Products to Bypass Windows Protections
Offered By: YouTube
Course Description
Overview
Explore techniques for bypassing Windows protections by exploiting vulnerabilities in security products in this conference talk from BSides San Francisco 2016. Delve into the methods used to identify and exploit weaknesses in watchdog systems, gaining insights into potential security risks and mitigation strategies. Learn how attackers can potentially abuse security software to compromise Windows systems, and understand the implications for both defenders and security product developers.
Syllabus
BSidesSF 109 Sedating the Watchdog Abusing Security Products to Bypass Windows Protections Tomer Bit
Related Courses
Basics of Network SecurityCoventry University via FutureLearn Offensive Security Engineering
Udemy Hands-on Penetration Testing Labs 4.0
Udemy Hack Like a Pro - Ethical Hacking from A to Z
Udemy Exfiltration with Dnscat2
Pluralsight