Crafting The Unavoidable

Summary

Binary execution is one of the most reliable ways to compromise a system but not the most covert one since executables are suspicious by reputation also antiviruses and other host security controls will always inspect them for malicious functions by signature and/or behavior.
Over the time, there were quite a few creative attempts to lure innocent end-users to execute harmful binaries, for example social engineering but luckily most of these attempts fail in front of basic user awareness and a solid host security control.
In this presentation I will explain how modern antiviruses really work, how easily to trick and bypass them from the lowest possible level, I will also highlight the process of manually injecting the most evil payloads in the most innocent files while bypassing the most strict security controls.

Introduction and Facts

Introduction and Facts

One of the few solid theoretical results in the study of computer viruses is Frederick Cohen’s 1987 demonstration that there is no algorithm that can perfectly detect all possible viruses. However, using different layers of defense, a good detection rate may be achieved.

" What you just pull code from Rapid9 or some sh*t? since when did you become a script kiddie? "Elliot on Mr. Robot

Bypassing Signature-Based Detection

Binary execution is one of the most reliable ways to compromise a system but not the most covert one since executables are suspicious by reputation also antiviruses and other host security controls will always inspect them for malicious functions by signature and/or behavior.

Summary
Binary execution is one of the most reliable ways to compromise a system but not the most covert one since executables are suspicious by reputation also antiviruses and other host security controls will always inspect them for malicious functions by signature and/or behavior.
Over the time, there were quite a few creative attempts to lure innocent end-users to execute harmful binaries, for example social engineering but luckily most of these attempts fail in front of basic user awareness and a solid host security control.

In this presentation I will explain how modern antiviruses really work, how easily to trick and bypass them from the lowest possible level, I will also highlight the process of manually injecting the most evil payloads in the most innocent files while bypassing the most strict security controls.

Introduction and Facts
 
Virus Detection Techniques
One of the few solid theoretical results in the study of computer viruses is Frederick Cohen’s 1987 demonstration that there is no algorithm that can perfectly detect all possible viruses. However, using different layers of defense, a good detection rate may be achieved.
" What you just pull code from Rapid9 or some sh*t? since when did you become a script kiddie? "Elliot on Mr. Robot

Bypassing Signature-Based Detection

Binary execution is one of the most reliable ways to compromise a system but not the most covert one since executables are suspicious by reputation also antiviruses and other host security controls will always inspect them for malicious functions by signature and/or behavior.