Evading AV with Veil-Evasion

Sept. 27, 2017 via hackers-arise.com

One of the most important issues any hacker must address is how to get past security devices and remain undetected. These can include antivirus software, intrusion detection systems, firewalls, web application firewalls, and numerous others. As nearly all of these devices employ a signature-based detection scheme where they maintain a database of known exploits and payload signatures, the key is to either: ‚Äč create your own exploit, or change the signature of a known exploit or payload.