Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore techniques for bypassing Windows protections by exploiting vulnerabilities in security products in this conference talk from BSides San Francisco 2016. Delve into the methods used to identify and exploit weaknesses in watchdog systems, gaining insights into potential security risks and mitigation strategies. Learn how attackers can potentially abuse security software to compromise Windows systems, and understand the implications for both defenders and security product developers.