Explore techniques for bypassing Windows protections by exploiting vulnerabilities in security products in this conference talk from BSides San Francisco 2016. Delve into the methods used to identify and exploit weaknesses in watchdog systems, gaining insights into potential security risks and mitigation strategies. Learn how attackers can potentially abuse security software to compromise Windows systems, and understand the implications for both defenders and security product developers.
Overview
Syllabus
BSidesSF 109 Sedating the Watchdog Abusing Security Products to Bypass Windows Protections Tomer Bit