Provided by: SecurityTube.net
In this webcast, the presenter will, on the spot, fully bypass several antivirus systems using basic techniques. The presenter will bypass: signatures detection, emulation/virtualization, sandboxing and firewalls. How much time (development) is needed for it, for this result? Not more than 15 hours without a cent of investment.