EC
ethical hacking and countermeasures v8
878 Questions
Question No. 1
More sophisticated IDSs look for common shellcode signatures. But even these systems can be bypassed, by using polymorphic shellcode. This is a technique common among virus writers ?it basically hides the true nature of the shellcode in different disguises.
How does a polymorphic shellcode work?
Choose the correct option from the given list.
01 / 878