Hack Like a Pro: How to Evade AV Software with Shellter
Welcome back, my tenderfoot hackers! One key area on the minds of all hackers is how to evade security devices such as an intrusion detection system (IDS) or antivirus (AV) software. This is not an issue if you create your own zero-day exploit, or capture someone else's zero-day. However, if you are using someone else's exploit or payload, such as one from Metasploit or Exploit-DB, the security devices are likely to detect it and spoil all your fun. Security software largely works by recognizing a signature of malicious software. If you can change the signature of your malware, payload, or... more
from WonderHowTo http://ift.tt/20XSW5y
via IFTTT