Talk With an Expert

Bypassing Malware Defenses

Bypassing Malware Defenses (PDF, 1.80MB)Published: 03 Jun, 2010
Created by
Morton Christiansen

While most other areas of penetration testing are well understood, and their methodologies well documented, little information regarding testing and bypassing malware defenses is available in the public domain. Still, malware incidents remain the most expensive type of incidents caused by outsiders, while also being the most frequent type of incidents occurring to organizations. In addition, since malware payloads are normally executed on internal networks, bypassing most firewall restrictions, they do tend to be the weapon of choice for targeted attacks. Malware is used to perform multiple offensive activities: launching distributed denial of service attacks (DDoS), collecting classified information, etc. Consequently, testing and understanding the efficiency and configurations of malware defense systems is of uttermost importance.

Bypassing Malware Defenses