Andy Ful
From Hard_Configurator Tools
Thread author
Verified
Honorary Member
Top Poster
Developer
Well-known
- Dec 23, 2014
- 8,592
Andy,
I don't suppose you could provide a basic flowchart of this bypass, without of course revealing details on how it works?
That's right. My videos intend to show that generally the AV protection can be bypassed, assuming that the attacker has already got high privileges.
My intention was not to focus on explaining how to do it and what can happen next.
Of course, "what can happen next" must also be discussed to understand why one should focus on how to prevent it.
At home, "what can happen next" is a minor problem compared to "how to prevent malware, especially the elevated one".
Edit.
In Enterprises, "what can happen next" becomes an important problem. It is hardly possible to prevent security breaches.
The videos are also examples of why in an Enterprise environment, the AV should be a piece of more complex security.
Last edited: