Similar to encryption, obfuscation techniques can protect sensitive data from being read. Obfuscation is often deployed as a defense against reverse engineers.
Obfuscation makes data harder to read or interpret, but doesn’t necessarily protect the data as encryption does.
Some examples of obfuscation are changing variable and function names to nonsensical values, adding pointless dummy code, or encoding data using an obscure algorithm.
Links to this note
- deobfuscation
- Main Index
- defendingagainstmaliciousshims-pierce2015
- bvp47-pangulab2022
- trackingteamtnt-fiser2021
- malware development essentials-sektor7
- unpacking diicot-tikochinski2024
- metasploit shellcode grows up: encrypted and authenticated C shells-pace2019
- unveiling wolfsbane-sperka2024
- evasionbydeoptimization-balci2024
- MPEG_CENC-buchanan2024
- outlaw-remillano2019
- chaos-blacklotuslabs2022
- chaos-lang2023
- borges2021
- sshbackdors-dumont2018
- attackers gaining shells
- binary protector
- dynamic obfuscation
- FLOSS
- function name randomization
- homoglyph obfuscation
- IP Address Obfuscation
- IPfuscation
- MACfuscation
- Main Index - O
- matryoshka obfuscation
- Monero
- objobf
- stack strings
- string hashing
- xor string obfuscation