Technical requirements
- Knowledge of the C or C++ programming languages
- Basic security research knowledge
- Basic knowledge of processes and threads
- An understanding of Windows API functions
- An understanding of YARA
- An understanding of log-based data such as Windows event logs
Throughout the book, we have presented and based our antivirus bypass techniques on the following two approaches:
- Vulnerability-based bypass
- Detection-based bypass
Our main goal in this book is to stop and mitigate these bypass techniques by demonstrating them and offering mitigations for them. In the following section, you will learn how to avoid antivirus bypass that is based on dedicated vulnerabilities.
Check out the following video to see the code in action: https://bit.ly/3wqF6OD