Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (2)

Search Parameters:
Keywords = msfvenom

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
22 pages, 1978 KB  
Article
Evading Antivirus Detection Using Fountain Code-Based Techniques for Executing Shellcodes
by Gang-Cheng Huang, Ko-Chin Chang and Tai-Hung Lai
Sensors 2025, 25(2), 460; https://doi.org/10.3390/s25020460 - 15 Jan 2025
Cited by 3 | Viewed by 5726
Abstract
In this study, we propose a method for successfully evading antivirus detection by encoding malicious shellcode with fountain codes. The Meterpreter framework for Microsoft Windows 32-bit and 64-bit architectures was used to produce the shellcode used in this investigation. The experimental results proved [...] Read more.
In this study, we propose a method for successfully evading antivirus detection by encoding malicious shellcode with fountain codes. The Meterpreter framework for Microsoft Windows 32-bit and 64-bit architectures was used to produce the shellcode used in this investigation. The experimental results proved that detection rates were substantially decreased. Specifically, the number of detected instances using antivirus vendors for 32-bit shellcode decreased from 18 to 3, while for 64-bit shellcode, it decreased from 16 to 1. This method breaks up a malicious payload into many packets, each with their own distinct structure, and then encodes them. This obfuscation approach maintains the shellcode’s integrity, ensuring correct code execution. However, in the persistence phase of the penetration testing process, this method offers an additional means of evading antivirus techniques. Full article
Show Figures

Figure 1

24 pages, 1751 KB  
Article
Chaotic-Based Shellcode Encryption: A New Strategy for Bypassing Antivirus Mechanisms
by Gang-Cheng Huang, Ko-Chin Chang and Tai-Hung Lai
Symmetry 2024, 16(11), 1526; https://doi.org/10.3390/sym16111526 - 14 Nov 2024
Cited by 5 | Viewed by 6092
Abstract
This study employed chaotic systems as an innovative approach for shellcode obfuscation to evade current antivirus detection methods. Standard AV solutions primarily rely on static signatures and heuristic analysis to identify malicious code. However, chaotic systems employ dynamic and unpredictable encryption methods, significantly [...] Read more.
This study employed chaotic systems as an innovative approach for shellcode obfuscation to evade current antivirus detection methods. Standard AV solutions primarily rely on static signatures and heuristic analysis to identify malicious code. However, chaotic systems employ dynamic and unpredictable encryption methods, significantly obstructing detection efforts. The utilization of various chaotic maps for shellcode encryption facilitates the generation of multiple unique variations from the same functional code, each exhibiting distinct unpredictability due to the inherent nonlinearity and sensitivity of chaotic systems to initial conditions. The unpredictability of these situations poses a considerable challenge for antivirus software in recognizing consistent patterns, resulting in decreased detection rates. The findings from our experiments demonstrate that chaos-driven encryption methods significantly outperform traditional encryption techniques in terms of evading detection. This paper emphasizes the potential of chaos theory to enhance malware evasion strategies, offering a sophisticated approach to bypassing modern antivirus protections while ensuring the effectiveness of malicious payloads. Full article
(This article belongs to the Topic A Real-World Application of Chaos Theory)
Show Figures

Figure 1

Back to TopTop