How to do it...

This attack vector is based on the simple principle of generating a malicious executable and then encoding it with available encoders, so as to bypass antivirus protection. The following are some examples of infectious media generators with their descriptions as well:

Get Metasploit Penetration Testing Cookbook - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.