Chapter 6: Other Antivirus Bypass Techniques
In this chapter, we will go into deeper layers of understanding antivirus bypass techniques. We will first introduce you to Assembly x86 code so you can better understand the inner mechanisms of operating systems, compiled binaries, and software, then we will introduce you to the concept, usage, and practice of reverse engineering. Afterward, we will go through implementing antivirus bypass using binary patching, and then the use of junk code to circumvent and harden the analysis conducted by security researchers and antivirus software itself. Also, we will learn how to bypass antivirus software using PowerShell code, and the concept behind the use of a single malicious functionality.
In this chapter, we will explore the following topics:
- Antivirus bypass using binary patching
- Antivirus bypass using junk code
- Antivirus bypass using PowerShell
- Antivirus bypass using a single malicious functionality
- The power of...