AV Evasion

Methods of Detecting Malicious Code

Signature-Based Detection

  • Identifies known malware based on predefined signatures.

Heuristic-Based Detection

  • Analyzes the behavior of code to identify potential threats based on heuristics.

Behavioral-Based Detection

  • Examines the behavior of code during execution to identify suspicious activities.

ON-Disk Evasion

Packers

  • Tools that compress or encrypt executable files to obfuscate their content.

Obfuscators

  • Techniques that obscure the code's logic and structure to make it harder to analyze.

Crypters

  • Tools that encrypt executable files to evade signature-based detection.

Software Protectors

  • Programs that protect executable files from analysis and tampering.

In-Memory Evasion

Remote Process Memory Injection

  • Injecting code into the memory space of a remote process.

Reflective DLL Injection

  • Loading a DLL into a process's memory without putting it on disk.

Process Hollowing

  • Creating a new suspended process and replacing its memory space with malicious code.

Inline Hooking

  • Modifying function pointers to redirect execution flow.

Practical

Manual

  • Simple Reverse Shell Binary:

  • PowerShell ExecutionPolicy:

  • Metasploit One-Line Command:

  • PowerShell AV Bypass Payload:

Tools

  • Shelter:

    • A tool for binary analysis and evasion.

  • TheFatRat:

    • An easy-to-use tool for generating backdoors with evasion capabilities.

  • Empire:

    • A PowerShell and Python post-exploitation framework with AV evasion features.

  • Veil:

    • A framework for generating various types of shellcode, including evasion techniques.

Last updated

Was this helpful?