Chapter 6: Other Antivirus Bypass Techniques

In this chapter, we will go into deeper layers of understanding antivirus bypass techniques. We will first introduce you to Assembly x86 code so you can better understand the inner mechanisms of operating systems, compiled binaries, and software, then we will introduce you to the concept, usage, and practice of reverse engineering. Afterward, we will go through implementing antivirus bypass using binary patching, and then the use of junk code to circumvent and harden the analysis conducted by security researchers and antivirus software itself. Also, we will learn how to bypass antivirus software using PowerShell code, and the concept behind the use of a single malicious functionality.

In this chapter, ...

Get Antivirus Bypass Techniques now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.