Chapter 7: Antivirus Bypass Techniques in Red Team Operations
In this chapter, you will learn about the use of antivirus bypass techniques in the real world, and you also will learn about the difference between penetration testing and red teaming, along with their importance, as well as how to fingerprint antivirus software as part of a stage-based malware attack.
After we have finished our research and found antivirus software bypass techniques in a lab environment, we will want to transfer our use of them to the real world—for example, in a red team operation.
In this chapter, we will explore the following topics:
- What is a red team operation?
- Bypassing antivirus software in red team operations
- Fingerprinting antivirus software