How does a polymorphic shellcode work?
More sophisticated IDSs look for common shellcode signatures. But even these systems can be bypassed, by using polymorphic shellcode. This is a technique common among virus writers it basically hides the true nature of the shellcode in different disguises.
How does a polymorphic shellcode work?