Adversary Emulation, Evasion and Custom Tradecraft // Field Brief

AV and EDR Evasion Concepts

Detection pressure, AMSI/ETW awareness, in-memory execution and behavioural shaping.

field briefoperator referencepublic sources

Why this topic matters

Evasion should be treated as an engineering problem, not a magic trick. You are testing how controls reason about process trees, scripts, memory use, signatures, AMSI, ETW, macro behaviour and user context.

Operator checks

  • Tie every evasion attempt to a question about detection logic or control gaps.
  • Measure behaviour before and after changes rather than stacking folklore-based bypasses blindly.
  • Distinguish prevention failure from telemetry failure; both matter, but they answer different questions.
  • Keep OPSEC in mind: a noisy bypass can answer the engagement question while still being the wrong operational choice.

Reporting lens

Write findings in terms of trust crossed, scope enlarged and business or operational effect reached. That keeps the note useful whether you are validating a lab, an internal research target or a live customer environment.

Curated public references