This video from DerbyCon discusses the basics of the AV evasion problem, what techniques work, which ones don't and why. The talk has a particular focus on AV evasion as it relates to Metasploit payloads.
Author: David Maloney is a Senior Software Engineer on the Metasploit team at Rapid7.
Posted on 21 October 2104. | Designed for IT and security professionals, the service gives a view of the data exchanged with partner and cloud applications beyond the network firewall. Completely passive, it runs on non-production systems, and does not require firewall changes.
Posted on 15 October 2014. | Lynis unearths vulnerabilities, configuration errors, and provides tips for system hardening. It is written in shell script, installation is not required and can be performed with a privileged or non-privileged account.
Posted on 14 October 2014. | Enabling employees and contractors to bring their own devices to work has become a way of life for many organizations. Many understand that traditional perimeter security defenses are not effective at identifying attacks on mobile devices.