Question. If an attacker can convince a user to download and run a malicious binary, script, or office document how easy is it to by-pass a common Anti-Virus program and obtain an initial foothold into an organization (i.e. a shell)? Thoughts & Experiment. I believe this is a very important question, in my experience it