In this chapter, you have learned about the evolution of antiviruses, and how they are now starting to make use of machine learning and artificial intelligence. You have learned about the various techniques that can be used for evading antiviruses, and the different tools that can be used to create undetectable payloads. We have created some payloads using shellcode and looked at their detection rate using online services such as VirusTotal.
In the next chapter (Chapter 12, Maintaining Control within the Environment), we will discuss persistence and how to maintain access in the compromised network.