Understand how an antivirus worksHow long can you waitWho is your TargetWhat Kind of Capabilities do they haveBased on File signaturesBased on PatternsBased on DLL usedBased on DLL installedBased onIPHostnameBased on file typesNew Attack Vector of using WSL for conducting attacks