Session

Stealth Mode Engaged: Advanced Antivirus and AMSI Evasion Techniques

In a post-signature world, antivirus engines have evolved — but so have attackers. AMSI is Microsoft’s last line of defense against malicious scripts, while UAC acts as the gatekeeper to elevated execution. What happens when both are bypassed with surgical precision?

In this talk, we’ll venture deep into advanced evasion on Windows, focusing on PowerShell and JScript-based attacks designed to dismantle modern defenses. Through the lens of offensive operations and red team engagements, we’ll explore:

Bypassing AMSI with .NET Reflection in PowerShell

Overwriting AMSI buffers in memory (Wrecking AMSI)

UAC Bypasses that remain effective even against Microsoft Defender's real-time scans

AMSI evasion using JScript and COM-based execution

Each evasion technique will be demonstrated, dissected, and explained — including the underlying memory manipulation, abuse of trusted interfaces, and how attackers ensure persistence under heavy endpoint monitoring.

Alongside these practical payloads, we’ll cover:

Why AMSI is broken by design in certain contexts

The cat-and-mouse game between red teams and Microsoft patches

Defensive techniques to detect these evasions in real-time

This session is not for the faint of heart. It’s for defenders, red teamers, and researchers who want to stay ahead in a game where stealth, not brute force, wins.

Saurabh Kumar Pandey

MIQ - Associate Engineering Manager

Bengaluru, India

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top