Defense Evasion
Overview
Defense evasion encompasses techniques that red teams use to avoid detection by AV, EDR, application controls, and logging mechanisms. This section covers bypassing specific Windows security features (AMSI, AppLocker, ETW), evading endpoint detection products, process injection techniques, payload obfuscation, and leveraging built-in Windows utilities (LOLBins) to blend in with normal activity.
Topics in This Section
General Approach
- Identify defenses — determine what AV/EDR, application controls, and logging are in place
- Bypass security features — disable or evade AMSI, ETW, AppLocker as needed
- Obfuscate payloads — transform code to avoid static signatures
- Use living-off-the-land techniques — leverage trusted OS binaries for execution
- Test in a lab — validate evasion against the target's specific security stack before deployment