Bypassing antivirus software in red team operations
There are a lot of advantages to bypassing antivirus software in your professional journey when performing red team operations. In order to use this valuable knowledge, you will need to understand on which endpoint you are going to perform the bypass, using various techniques.
When performing red team operations on a company, one of the primary goals is to extract sensitive information from an organization. To do this, we will need to receive some type of access to the organization. For instance, if the organization uses Microsoft 365, extraction of information may be accomplished by using a simple phishing page for company employees, connecting to one of the employees' user accounts, and stealing information already located in the cloud.
But that is not always the case. Nowadays, companies still store their internal information in their Local Area Network (LAN)—for example, within Server Message Block (SMB) servers...