As we dive into this recipe, we'll rely on our automation script to provide a quick way to run the tools we need and to organize each tool's output for analysis. We may not notice a lot of difference when analyzing this polymorphed version of the reverse shell binary from previous recipes, but as we work our way into static analysis and dynamic analysis, the differences will become clear. We'll also examine some of the challenges malware authors or exploit authors face when employing polymorphism in their scripts.
For this recipe, we'll modify our automation Bash script again and then we will run it against our polymorphed reverse shell binary. We will review the output associated with the information gathering phase of our methodology, comparing it to the non-polymorphed version to see whether we notice any differences.
...