How Does Antivirus Software Work And How To Evade It

Sdílet
Vložit
  • čas přidán 23. 08. 2016
  • // Membership //
    Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
    // Courses //
    Full Ethical Hacking Course: www.udemy.com/course/full-web...
    Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
    Full Mobile Hacking Course: www.udemy.com/course/full-mob...
    // Books //
    Kali Linux Hacking: amzn.to/3IUXaJv
    Linux Basics for Hackers: amzn.to/3EzRPV6
    The Ultimate Kali Linux Book: amzn.to/3m7cutD
    // Social Links //
    Website: www.loiliangyang.com
    Facebook: / loiliangyang
    Instagram: / loiliangyang
    LinkedIn: / loiliangyang
    // Disclaimer //
    Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
  • Věda a technologie

Komentáře • 51

  • @LoiLiangYang
    @LoiLiangYang  Před 7 lety +8

    Remember to subscribe to the channel so that you can be kept abreast of the latest cybersecurity tutorials.

    • @emiliobianchi3652
      @emiliobianchi3652 Před 5 lety

      @Boot Hat takes you an hour to remove a virus that has already executed its mission?? On the other hand, thats if you know you have been infected lol

    • @emiliobianchi3652
      @emiliobianchi3652 Před 5 lety

      @Boot Hat , if the train is heading to Disney land, why not? no one is attacking you man. I was only sharing an opionion

    • @emiliobianchi3652
      @emiliobianchi3652 Před 5 lety

      @Boot Hat you do anything with the virus after studying it ?

    • @vishalchoudhary9037
      @vishalchoudhary9037 Před 2 lety

      What do you mean by checking hash signature? How exactly it works?
      Suppose i have a virus file and hash value is some "xxxxxxx", so to change the hash value i have to change only a LETTER in virus file?

  • @thediamondstewyt8260
    @thediamondstewyt8260 Před 4 lety +17

    How to evade it?
    Some people are here for the wrong reasons.

    • @aba22125
      @aba22125 Před 2 lety

      I'm not... I have a legit app and these f*cking stupid AVs are picking it up as malware. 4 of them in virustotal. I don't unserstanf

  • @tizziejames9040
    @tizziejames9040 Před 3 lety +3

    Very good. A great explanation.

  • @dhruvakumar0215
    @dhruvakumar0215 Před 2 lety +2

    Sir we can use viruses as security purposes

  • @K.B.1106
    @K.B.1106 Před 7 lety +7

    Wow your videos are very interesting! If i may ask, where did you learn all of this?

    • @LoiLiangYang
      @LoiLiangYang  Před 7 lety +12

      hi Kushan, thank you for watching the videos, I hope they are valuable
      to you. As a start, you can browse computer science curriculum and study
      those content from there. This will provide you the fundamentals to
      understanding technology. After which, you may branch towards other
      niche area of technology like Internet of Things, Network, and for this
      instance, Security. It will take a while to learn, but it can be
      learned.

  • @sherykhan5830
    @sherykhan5830 Před 2 lety

    Sir please guide me I wanna learn hacking so from where should I start

  • @Nightwalk444
    @Nightwalk444 Před 6 lety

    Ok, how hard is it to try to get rid of a rootkit?

  • @emiliobianchi3652
    @emiliobianchi3652 Před 5 lety +1

    Hi, can i use resource hacker to alter a source code or maybe obfuscate the code with using an obfuscator ????

    • @LoiLiangYang
      @LoiLiangYang  Před 5 lety +1

      Have not used it before, but I would presume so. Will try it out.

  • @haroldgar12
    @haroldgar12 Před 5 lety +1

    best explanation I heard yet.

  • @dennisasamoah2213
    @dennisasamoah2213 Před 5 lety +4

    this is a great content

  • @sd8414
    @sd8414 Před 7 lety +1

    Hi it help me lot.... I have 4 daught, will u ples clear me?
    1. How antivirus software auto update when i on my internet? (ie. i dont click for update)
    2. When i install any software it has a key/product key, how it work from remote?
    3.Virus or hacker can access my pc its clear from u but how they carry my data or destroy data?
    4. Its may be funny to u but still i want to know how a antivirus code or any software code embedded on a cd/dvd/ which we collect from stores.
    Looking for reply...

    • @r0sh4n0
      @r0sh4n0 Před 3 lety

      I know it late but here is your answer
      1 aniti virus has a connection all the time
      2 program connect to the company server to approve the key
      3 hacker access ur pc and act like you in every aspect
      4 no one uses CDs now xD

  • @johnsun2416
    @johnsun2416 Před 3 lety

    I don't use any security software not even widows defender, I have separate partition for windows 10 witch backup with Macrium, another partition for all my personal data, with backup as well, I figure if something go wrong, I just restore them, all my backups are multiple copies and safely store offline on removable drives, appreciate any advice.

    • @navr1111111111111111
      @navr1111111111111111 Před 5 měsíci

      Are you not concerned about someone exfiltrating your data?

    • @johnsun2416
      @johnsun2416 Před 4 měsíci

      All my personal sensitive data are encrypted@@navr1111111111111111

  • @themartyr2649
    @themartyr2649 Před 6 lety +1

    What can you do with a zero day exploits source code?

    • @LoiLiangYang
      @LoiLiangYang  Před 6 lety

      You can exploit systems without getting detected.

  • @dexterjones8071
    @dexterjones8071 Před 6 lety +1

    That's awesome 😁

  • @kalamyr2965
    @kalamyr2965 Před 18 dny

    Please the same video about android antiviruses

  • @dearsaltykid693
    @dearsaltykid693 Před 5 lety +1

    How does an antivirus sandbox/quarantine viruses?

    • @LoiLiangYang
      @LoiLiangYang  Před 5 lety +5

      By not allowing the virus to go into the file system or memory.

  • @anandgaddihalli4466
    @anandgaddihalli4466 Před 6 lety +2

    Hello sir what is exactly signature ?? . How signature will be identified???

  • @scaryaddress
    @scaryaddress Před 3 lety +1

    Quarantine .. a wird we all learned by now

  • @MrRobot222
    @MrRobot222 Před 4 lety

    I thought viruses needed manual execution and worms can self propagate, meaning they are different things.

  • @sherykhan5830
    @sherykhan5830 Před 2 lety

    How can learn hacking?

  • @roniwinchester8351
    @roniwinchester8351 Před 4 lety +1

    still amazing even it's has been 2 years lmao

  • @masol3726
    @masol3726 Před 6 lety +2

    If i write this code:
    :A
    start
    goto A
    and save it as a .bat
    did i just create a virus? if so, what type?

    • @skhumbuzocele1330
      @skhumbuzocele1330 Před 5 lety +1

      It is .bat source code that loops infinitely to exhaust computer memory forever. This the first security code one learns as programmer...

    • @ishdx9374
      @ishdx9374 Před 3 lety +1

      @@skhumbuzocele1330 it won't exhaust memory, it will loop indefinitely and hang the shell, and in my entire 4 year programming career I never saw such "security", it's not a security nits just infinite loop and can't damage your PC

    • @boom5935
      @boom5935 Před 2 lety

      @@ishdx9374 What about this cpp?
      int main()
      {
      while(1 > 0){
      int* m = new int;
      }
      return 0;
      }

    • @sindhurnair8192
      @sindhurnair8192 Před rokem

      ​@@boom5935 all the does is create infinite int var this will just lag the shell.

    • @boom5935
      @boom5935 Před rokem

      @@sindhurnair8192 It will cause the computer to run out of memory, then the computer will shutdown

  • @keiichi5299
    @keiichi5299 Před 2 lety

    POV: your here after reading Updater (manwha)

  • @khushisharma4779
    @khushisharma4779 Před 5 měsíci +1

    Oh bhai thodi hindi bhi bol le yr we can't understand anything that 's why we are here to understand the concept

  • @donovanroberts8060
    @donovanroberts8060 Před 7 lety

    This antivirus software “www just fanet” (Google it) was unveiled in 1993 and I have been utilizing it since that time. I`ve never endured and virus episodes that this software program was not able to protect my system from! I salute the technical team associated with this software that is exerting massive effort to keep hackers from intruding our computers and gadgets!

    • @Julio_Fiss
      @Julio_Fiss Před 7 lety

      It's a scam, this "antivirus" is itself a virus.

  • @velhi6149
    @velhi6149 Před 2 měsíci

    ♾️

  • @JamieVegas
    @JamieVegas Před 2 lety

    mahl-ware for mahl-icious files.