Which of the listed technique will NOT be effective in evading Anti-Virus scanner?

You are trying to package a RAT Trojan so that Anti-Virus software will not detect it. Which of the listed technique will NOT be effective in evading Anti-Virus scanner?

You are trying to package a RAT Trojan so that Anti-Virus software will not detect it. Which of the listed technique will NOT be effective in evading Anti-Virus scanner?

A.
Convert the Trojan.exe file extension to Trojan.txt disguising as text file

B.
Break the Trojan into multiple smaller files and zip the individual pieces

C.
Change the content of the Trojan using hex editor and modify the checksum

D.
Encrypt the Trojan using multiple hashing algorithms like MD5 and SHA-1



Leave a Reply 3

Your email address will not be published. Required fields are marked *


cristina

cristina

Hmmm…ok, I understand that the first answer will not help hide my Trojan. But even so, selecting first answer implies that the last one is actually helping me hide the trojan: MD5 and SHA-1 are NOT used for encryption!

Radish

Radish

Read on: Like most hash functions, MD5 is neither encryption nor encoding. It can be reversed by brute-force attack and suffers from extensive vulnerabilities as detailed in the security section below.

When you hash a file, you are sending only the hash value, which is non reversible, and does not send the actual file you are hashing.