# IOCs

Here is a picture from "Securi-Tay 2020: Offensive Tradecraft - Defence Evasion" by - Paul Laîné which briefly sums up the technologies used by AVs to detect malware

![](https://216667902-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MfpNy7QBsIOaHJ1vcf-%2F-MgDkn_cUzUZ1JN6DEN5%2F-MgDmR4LDCdV_JR1MnDp%2Fimage.png?alt=media\&token=ccb07b4d-409f-47be-a53f-255cd648ae8f)

We as attackers have to find ways to bypass and hide these detections.

I would also like to add a couple more things

* Sandboxing: Trigger payload in a controlled environment to track heuristic behaviors and flag known malware behavior
* Data Mining: Uses a known data set like virustotal to make algorithms to detect AV or just to build signatures to flag for
* In memory scanning: periodically scans or scans executable regions for malware in real time to detect malware
* Library load events
* Kernel callbacks
* EtwTi Kernel-mode event provider
