Summary
In this chapter, we presented to you two of our main antivirus bypass approaches (vulnerability-based bypass and detection-based bypass) and detailed the first approach, the approach of discovering new vulnerabilities that can help us to bypass the antivirus software. There are several types of vulnerabilities that can achieve a successful antivirus bypass.
In the next three chapters, we will discuss and go into details of the second approach, using many bypass methods followed by 10 practical examples.