We have covered all of the major phases of a penetration test in the last eight chapters. In this chapter, we will include the problems that tend to occur for a penetration tester in real-world scenarios. Gone are the days where a straightforward attack would pop you a shell in Metasploit. With the increase of attack surface these days, security perspectives have also increased gradually. Hence, tricky mechanisms are required to circumvent security controls of various natures. In this chapter, we'll look at different methods and techniques that can prevent security controls deployed at the target's endpoint. Throughout this chapter, we will cover:
- Bypassing AV detection for Meterpreter payloads
- Bypassing IDS systems
- Bypassing firewalls and blocked ports
So, let's get started with the evasion techniques.