Skip to main content

Host Evasions

Understand the techniques behind host-based security and bypass the most common security products in Windows operating systems.

This module provides the essential knowledge and fundamental techniques to bypass various host-based security solutions, including AV products, UAC and AppLocker, Logging, Runtime Detection, and AMSI. You will also learn the Living-Off-the-Land technique and how to leverage the Windows Sysinternals tool to perform various Red Team purposes.

Windows Internals

Learn and understand the fundamentals of how Windows operates at its core.

Introduction to Windows API

Learn how to interact with the win32 API and understand its wide range of use cases

Abusing Windows Internals

Leverage windows internals components to evade common detection solutions, using modern tool-agnostic approaches.

Introduction to Antivirus

Understand how antivirus software works and what detection techniques are used to bypass malicious file checks.

AV Evasion: Shellcode

Learn shellcode encoding, packing, binders, and crypters.

Obfuscation Principles

Leverage tool-agnostic software obfuscation practices to hide malicious functions and create unique code.

Signature Evasion

Learn how to break signatures and evade common AV, using modern tool-agnostic approaches.

Bypassing UAC

Learn common ways to bypass User Account Control (UAC) in Windows hosts.

Runtime Detection Evasion

Learn how to bypass common runtime detection measures, such as AMSI, using modern tool-agnostic approaches.

Evading Logging and Monitoring

Learn how to bypass common logging and system monitoring, such as ETW, using modern tool-agnostic approaches.

Living Off the Land

Learn the essential concept of "Living Off the Land" in Red Team engagements.