Summary
In this chapter of the book, we learned about three antivirus static engine bypass techniques. We learned about rename and control-flow obfuscations, about YARA rules and how to bypass them easily, and we also learned about encryption types such as oligomorphism, polymorphism, and metamorphism, and why packing is a good method to bypass static antivirus engines.
In the next chapter, you will learn about four general antivirus bypass techniques.