• We just launched and are currently in beta. Join us as we build and grow the community.

Others Antivirus Bypass

itssmikefm

LOL Strategist
I Rep
0
0
0
Rep
0
I Vouches
0
0
0
Vouches
0
Posts
98
Likes
14
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 300 XP
Link:
AV Evasion Methodology
Currently, AVs use different methods for checking if a file is malicious or not, static detection, dynamic analysis, and for the more advanced EDRs, behavioural analysis.
Static detection
Static detection is achieved by flagging known malicious strings or arrays of bytes in a binary or script, and also extracting information from the file itself (e.g. file description, company name, digital signatures, icon, checksum, etc.). This means that using known public tools may get you caught more easily, as they've probably been analyzed and flagged as malicious. There are a couple of ways of getting around this sort of detection:
    • Encryption
If you encrypt the binary, there will be no way for AV of detecting your program, but you will need some sort of loader to decrypt and run the program in memory.
    • Obfuscation
Sometimes all you need to do is change some strings in your binary or script to get it past AV, but this can be a time-consuming task depending on what you're trying to obfuscate.
    • Custom tooling
If you develop your own tools, there will be no known bad signatures, but this takes a lot of time and effort.
 

442,401

317,942

317,951

Top