首页 > 编程语言 > 详细

Python Ethical Hacking - TROJANS Analysis(3)

时间:2019-10-13 18:08:58      阅读:81      评论:0      收藏:0      [点我收藏+]

BYPASSING ANTI-VIRUS PROGRAMS

AV programs detect viruses based on:

1. Code - compare files to huge databases of signatures.

    ->Use own code, obfuscation, useless operations, encode, pack ...etc

2. Behaviour - run a file in a sandbox and analyze it.

   -> Run trusted operations before evil code.

   ->Delay execution of evil code.

 

Scan the file on the following website:

NoDistribute - Online Virus Scanner Without Result Distribution

https://nodistribute.com/

技术分享图片

 

 

Using UPX to Package the executable program.

https://upx.github.io/

Download the file from https://github.com/upx/upx/releases/download/v3.95/upx-3.95-amd64_linux.tar.xz.

And extract to the /opt folder.

技术分享图片

 

 Compress the evil file through UPX.

./upx /root/PycharmProjects/reverse_backdoor/dist/reverse_backdoor.exe -o compressed_backdoor.exe

技术分享图片

 

 

Scan the compressed_backdoor.exe file, the result is a little better.

技术分享图片

 Take your file Unique and delay to execute the evil code to let the AV program think your program is harmless.

Python Ethical Hacking - TROJANS Analysis(3)

原文:https://www.cnblogs.com/keepmoving1113/p/11666866.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!