05/09 (Tue.) 16:30 - 17:00
LMAO I'm dying :)) - why should I bypass If I can totally shut it off? From token forgery to quarantine AV/EDR into sandbox
簡報連結
  • LOCATION | Taipei Nangang Exhibition Center, Hall 2 7F 701C
  • LEVEL | Intermediate
  • SESSION TYPE | Onsite
  • LANGUAGE | Chinese
  • SESSION TOPIC | Endpoint Security Software Security APT

Bypassing signature detection is a common and general hacking technique, eh... but it's no longer used by hackers - huh? I mean what? If the hacker can just turn off your whole protection ... what's the reason to bypass ;)

In this session, we will share the new forms of tricks that we have observed in the wild and community over the past two years that hackers are using: exploiting flaws in the standard architecture of modern anti-virus, and the ability to shut down anti-virus protection perfectly. We will demonstrate seven new attack strategies: how to forge tokens, disguise sleep mode, exploit driver issues, and even put anti-virus in a sandbox! At the end of the agenda, we will share the principles behind these attacks to help Blue Team members to detect and respond to these attacks early.