Nytro Posted March 30, 2011 Report Posted March 30, 2011 Bypassing Anti-Virus ScannersContents Chapter 1 – Introduction ..............................................................................................................2 Chapter 2 – PE File Structure ......................................................................................................3 2.1 - AV Signatures and the PE file format ..................................................................................4 2.2 – Modifying AV Signatures in PE Files .................................................................................5 2.3 – Polymorphic Techniques and Hijacks .................................................................................7 Chapter 3 – Encoding Binary Files ..............................................................................................8 3.1 – Preparing the PE file for Encoding .....................................................................................9 3.2 – Implementing the Custom Encoder ...................................................................................13 Chapter 4 – Decoding Binary Files.............................................................................................16 4.1 – Altering the Encoder to a Decoder ....................................................................................16 4.2 – Testing the Custom Decoder .............................................................................................18 Chapter 5 – Conclusion ...............................................................................................................21Download:http://www.exploit-db.com/download_pdf/17066M-am uitat in mare peste el si cred ca se bazeaza pe ideile prezentate aici:Free Security Training Videos by Offensive SecurityTutorialul video: "I Piss on Your AV Presentation Watch Now", de Mati Ahroni aka muts. Quote