Explore advanced techniques for bypassing email and web filtering security controls in this Black Hat conference talk. Discover how attackers can exploit vulnerabilities in filtering products and services to gain unauthorized access and deliver effective client-side attacks. Learn about new tools for automated enumeration of filtering policies and configurations. Examine statistical analysis of filtering solutions used by major companies and see demonstrations of evasion techniques that work against patched systems. Gain insights into identifying filtering weaknesses from both offensive and defensive perspectives to improve organizational security posture.
Overview
Syllabus
I Know Your Filtering Policy Better than You Do
Taught by
Black Hat