Chapter 3: Antivirus Research Approaches
In this chapter, you will learn about the Windows operating system protection rings concept, we will introduce two of our real-life bypass examples, and you will also learn the basic three vulnerabilities that can be used to bypass antivirus software.
After explaining what leads are, how they help us, and how to gather them to start conducting antivirus research, we have now come to the stage where it is time to choose which approach is most appropriate for conducting research on antivirus software and then starting to research the leads we found in the previous chapter.
In this chapter, we will go through the following topics:
- Understanding the approaches to antivirus research
- Introducing the Windows operating system
- Understanding protection rings
- Protection rings in the Windows operating system
- Windows access control list
- Permission problems in antivirus software
- Unquoted Service Path
- DLL hijacking...