A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Antivirus Evasion through Antigenic Variation (Why the Blacklisting Approach to AV is Broken) - Trenton Ivey, Neal Bridges Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos)

Antivirus Evasion through Antigenic Variation (Why the Blacklisting Approach to AV is Broken) - Trenton Ivey, Neal Bridges
Derbycon 2013

Description: Think of the last time you got sick. Your immune system is an amazing piece of machinery, but every now and then, something gets past it. Antivirus evasion techniques can become more effective when modeled after infectious diseases. This talk highlights many of the antivirus evasion techniques in use today. Going further, this talk shows how genetic algorithms can quickly and repeatedly “evolve” code to evade many malicious code detection techniques in use today.

Bio: “Trenton has had the desire to understand how things work since early childhood. Hacking, programming, reverse engineering, and electronics quickly became some of his favorite hobbies. Trenton went to college with the hopes of becoming a doctor. After surviving classes like Advanced Genetics, Immunology, Cellular Biology, Biochemistry, and Organic Chemistry, he graduated college with a major in biology and a minor in chemistry. After undergraduate school, Trenton was able to work in a remote Hospital Lab in Zimbabwe, Africa. It was during this time that, through a strange turn of events, he realized his true passion was Information Security. Years later, Trenton now leads the Network Pentesting Team at a Fortune 500 company.
Neal Bridges started in IT in 1994 hacking BBS’s and HVAC systems. He enlisted in the USAF in 2003 and worked in the cyber arena for over 10 years While at the AF he pioneered the first deployed VOIP solution, was hand selected as part of the team create a brand new Network Warfare Operator career field, and was the lead instructor for network exploitation and counter network exploitation efforts, and created numerous network exploitation exercises. He is a current SANS instructor and Senior Penetration Tester at a Fortune 500 company.”

Back to Derbycon 2013 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast