Finance Certifications Goldman Sachs & Amazon Teams Trust
Learn the Skills Netflix, Meta, and Capital One Actually Hire For
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a DEF CON 31 conference talk that reveals critical vulnerabilities in Windows Defender's signature update process. Dive deep into Windows Defender architecture, signature database format, and update process security verification logic to understand how unprivileged users can potentially compromise Windows systems without requiring a rogue certificate. Learn about Defender-Pretender, a tool demonstrating how attackers can neutralize EDR capabilities, enabling malicious code execution without detection and potentially causing irreversible system damage through forced deletion of critical files. Discover the implications of manipulating Defender's detection and mitigation logic, highlighting significant security risks in what should be a highly secured update process.
Syllabus
DEF CON 31 - Defender Pretender When Windows Defender Updates Become a Security Risk -Bar, Attias
Taught by
DEFCONConference