Evading Antivirus Detection Using Fountain Code-Based Techniques for Executing Shellcodes.

Sensors (Basel)

Department of Computer Science and Information Engineering, Chung Cheng Institute of Technology, National Defense University, Taoyuan 335009, Taiwan.

Published: January 2025

In this study, we propose a method for successfully evading antivirus detection by encoding malicious shellcode with fountain codes. The Meterpreter framework for Microsoft Windows 32-bit and 64-bit architectures was used to produce the shellcode used in this investigation. The experimental results proved that detection rates were substantially decreased. Specifically, the number of detected instances using antivirus vendors for 32-bit shellcode decreased from 18 to 3, while for 64-bit shellcode, it decreased from 16 to 1. This method breaks up a malicious payload into many packets, each with their own distinct structure, and then encodes them. This obfuscation approach maintains the shellcode's integrity, ensuring correct code execution. However, in the persistence phase of the penetration testing process, this method offers an additional means of evading antivirus techniques.

Download full-text PDF

Source
http://dx.doi.org/10.3390/s25020460DOI Listing

Publication Analysis

Top Keywords

evading antivirus
12
antivirus detection
8
shellcode decreased
8
detection fountain
4
fountain code-based
4
code-based techniques
4
techniques executing
4
executing shellcodes
4
shellcodes study
4
study propose
4

Similar Publications

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!