Summary
In this chapter of the book, we started with preparing ourselves for antivirus bypass research, and you gleaned our main perspective about antivirus bypass—the use of platforms such as VirusTotal and other alternatives. Furthermore, you have learned about Windows API functions and their use in the Windows operating system, as well as about process address spaces and three different process-injection techniques.
Next, we introduced you to some accompanying knowledge, such as the common PE file types, the PE file structure, how to execute a DLL file, and why attackers use DLL files as an integral part of their attacks.
Also, we learned about timing-based attacks, using the Sleep()
and GetTickCount()
functions respectively to evade antivirus detections, and looked at why the Sleep()
function is irrelevant in modern antivirus bypass techniques.
Other than that, you learned about memory allocations and the differences between the malloc()
and calloc()
system call...