GAQM Certified Ethical Hacker (CEH) CEH-001 Question # 161 Topic 17 Discussion

GAQM Certified Ethical Hacker (CEH) CEH-001 Question # 161 Topic 17 Discussion

CEH-001 Exam Topic 17 Question 161 Discussion:
Question #: 161
Topic #: 17

More sophisticated IDSs look for common shellcode signatures. But even these systems can be bypassed, by using polymorphic shellcode. This is a technique common among virus writers ?it basically hides the true nature of the shellcode in different disguises.

How does a polymorphic shellcode work?


A.

They encrypt the shellcode by XORing values over the shellcode, using loader code to decrypt the shellcode, and then executing the decrypted shellcode


B.

They convert the shellcode into Unicode, using loader to convert back to machine code then executing them


C.

They reverse the working instructions into opposite order by masking the IDS signatures


D.

They compress shellcode into normal instructions, uncompress the shellcode using loader code and then executing the shellcode


Get Premium CEH-001 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.