Section 3: Using Bypass Techniques in the Real World
In this section, we'll look at using the antivirus bypass technique approaches, tools, and techniques we've learned about in real-world scenarios, distinguish between penetration tests and red team operations, and understand how to practically fingerprint antivirus software. Furthermore, we'll learn the principles, approaches, and techniques to write secure code and to enrich antivirus detection capabilities.
This part of the book comprises the following chapters:
- Chapter 7, Antivirus Bypass Techniques in Red Team Operations
- Chapter 8, Best Practices and Recommendations