Добавить
Уведомления

D0n Quix0te: Evasions, How Do They Work ? - ISSA LA Summit VI

First came the system, then the system was hacked. Next came the defense, and the defense was bypassed. Today's defenders are in an ever increasing arms race with attackers, and the attackers are winning. As new defense strategies come to market, new ways to evade and bypass the follow soon after. In this talk we explore why detecting attacks and defending targets is so difficult, how increasingly clever evasion techniques are being successfully used by attackers, and why evasion detection should be a consideration in any modern defense system if it is to be effective.

Иконка канала Кодерские решения
8 подписчиков
12+
16 просмотров
2 года назад
12+
16 просмотров
2 года назад

First came the system, then the system was hacked. Next came the defense, and the defense was bypassed. Today's defenders are in an ever increasing arms race with attackers, and the attackers are winning. As new defense strategies come to market, new ways to evade and bypass the follow soon after. In this talk we explore why detecting attacks and defending targets is so difficult, how increasingly clever evasion techniques are being successfully used by attackers, and why evasion detection should be a consideration in any modern defense system if it is to be effective.

, чтобы оставлять комментарии