When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. JSFuck - Wikipedia

    en.wikipedia.org/wiki/JSFuck

    Lacking the distinct features of "usual" JavaScript, obfuscation techniques like JSFuck can assist malicious JavaScript code in bypassing intrusion prevention systems [15] or content filters. For instance, the lack of alphanumeric characters in JSFuck and a flawed content filter allowed sellers to embed arbitrary JSFuck scripts in their eBay ...

  3. Obfuscation (software) - Wikipedia

    en.wikipedia.org/wiki/Obfuscation_(software)

    In software development, obfuscation is the practice of creating source or machine code that is intentionally difficult for humans or computers to understand. Similar to obfuscation in natural language, code obfuscation may involve using unnecessarily roundabout ways to write statements. Programmers often obfuscate code to conceal its purpose ...

  4. Jscrambler - Wikipedia

    en.wikipedia.org/wiki/Jscrambler

    Jscrambler is a technology company mainly known for its JavaScript obfuscator and eponymous monitoring framework. The obfuscator makes it harder to reverse engineer a web application's client-side code and tamper with its integrity.

  5. Decompiler - Wikipedia

    en.wikipedia.org/wiki/Decompiler

    Decompilation is the process of transforming executable code into a high-level, human-readable format using a decompiler.This process is commonly used for tasks that involve reverse-engineering the logic behind executable code, such as recovering lost or unavailable source code.

  6. Intrusion detection system evasion techniques - Wikipedia

    en.wikipedia.org/wiki/Intrusion_detection_system...

    To obfuscate their attacks, attackers can use polymorphic shellcode to create unique attack patterns. This technique typically involves encoding the payload in some fashion (e.g., XOR-ing each byte with 0x95), then placing a decoder in front of the payload before sending it. When the target executes the code, it runs the decoder which rewrites ...

  7. Category:Software obfuscation - Wikipedia

    en.wikipedia.org/wiki/Category:Software_obfuscation

    Main page; Contents; Current events; Random article; About Wikipedia; Contact us

  8. Polymorphic code - Wikipedia

    en.wikipedia.org/wiki/Polymorphic_code

    Emulation may be used to defeat polymorphic obfuscation by letting the malware demangle itself in a virtual environment before utilizing other methods, such as traditional signature scanning. Such a virtual environment is sometimes called a sandbox. Polymorphism does not protect the virus against such emulation if the decrypted payload remains ...

  9. Shellcode - Wikipedia

    en.wikipedia.org/wiki/Shellcode

    Exploits that target browsers commonly encode shellcode in a JavaScript string using percent-encoding, escape sequence encoding "\uXXXX" or entity encoding. [10] Some exploits also obfuscate the encoded shellcode string further to prevent detection by IDS.