Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
0Activity

Table Of Contents

Why Can Antivirus Be Targeted
Why Can AV Be Targeted - Continue
Why AV is error prone?
Finding vulnerabilities of Antivirus
Audit Antivirus
Audit – Engine: Source Code
Audit – Engine: Reversing
Audit – Engine: Fuzzing!
Audit Result
Audit – Management
Exploiting Antivirus
Local Privilege Escalation
ActiveX - Exploitation
Engine – Exploitation
Root the Mail Server - continue
Antivirus Remote Fingerprint
Antivirus Vendors Will Help You
Exploiting the Engine from Web
P2P/IM/EMAIL
Engine Exploitation - continue
Management - Exploitation
To Antivirus Vendors
To Antivirus Vendors - continue
Future work
Questions?
0 of .
Results for:
No results containing your search query
P. 1
AttackingAV_syscan08hk

AttackingAV_syscan08hk

Ratings: (0)|Views: 5 |Likes:
Published by Stewart Henderson

More info:

Published by: Stewart Henderson on Jan 25, 2014
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PPT, PDF, TXT or read online from Scribd
See more
See less

01/25/2014

pdf

text

original

You're Reading a Free Preview
Pages 5 to 40 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->