PrepAway - Latest Free Exam Questions & Answers

Tag: they encrypt the shellcode by xoring values over the shellcode

How does a polymorphic shellcode work?

More sophisticated IDSs look for common shellcode signatures. But even these systems can be bypassed, by using polymorphic shellcode. This is a technique common among virus writers it basically hides the true nature of the shellcode in different disguises.
How does a polymorphic shellcode work?