Summary
Throughout this chapter, we learned about AV evasion techniques using custom C encoders and decoders, and we used pyinstaller
to generate Python Meterpreter executables. We bypassed the signature matching of IDS systems, and we also avoided Windows firewall blocked ports using the all-TCP-ports Meterpreter payload. The next chapter relies heavily on these techniques and will take a deep dive into Metasploit.