Summary
In this chapter of the book, we learned about other antivirus bypass techniques that can be potentially used for bypassing both static and dynamic engines.
The techniques presented in the chapter were binary patching, junk code, PowerShell, and a single malicious functionality.
In the binary patching technique, we learned the basics of reverse engineering x86 Windows-based applications and the timestomping technique that is used to manipulate the timestamp of executable files.
In the junk code technique, we explained the use of if
block statements, which will subvert the antivirus detection mechanism.
In the PowerShell technique, we used the PowerShell tool to bypass the antivirus.
And in the single malicious functionality technique, we asked an important question to better understand the antivirus detection engine perspective and answered the question followed by a practical example.
In the next chapter, we will learn about what can we do with the antivirus...