Testing Endpoint Protection - How Anyone Can Bypass Next Gen AV
Offered By: YouTube
Course Description
Overview
Explore endpoint protection testing and next-generation antivirus bypass techniques in this 42-minute conference talk from Derbycon 2019. Delve into Kevin Gennuso's methodology, covering topics such as Atomic Red Team, malware, and MS Venom. Learn about vendor claims, configuration changes, false positives, and test environments. Discover insights on containment, automation, and standard user scenarios. Gain understanding of success and failure metrics, NDA considerations, and vendor reactions to testing. Uncover the intricacies of evaluating endpoint security solutions and their effectiveness against modern threats.
Syllabus
Intro
Who am I
How we got here
Methodology
Atomic Red Team
Malware
MS Venom
Not PowerShell NPS
Results
Conclusions
Vendor Claims
Clear Winner
Configuration Changes
False Positives
Did we have anything additional
Can the end point solution catch it
Can we bypass it
Can we cripple it
Test environment
Automation
Standard User
Containment
Success Failure
Does NDA Expire
Vendors Watching
Did the vendors threaten legal action
Did they know I was going to talk about Next Gen AV
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube