Session

Bypass and abuse a next-gen antimalware

In 2019 I was debugging, and I ran into some exceptions which were not created by my code, but a Next-Generational AI based antimalware which has injected its code into my script. The sorry about how I debugged their code. How I bypassed its detection, and later how I abused the detection itself to load and execute my code as SYSTEM.

David Sass

Service Reliability Engineer

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top