Bypassing Signature-Based AV

If you want to execute arbitrary code on an endpoint during a penetration test, chances are you’ll have to evade some kind of antivirus solution. AV engines use two detection methods to identify malicious code – signature-based and heuristic-based...