8bytes
Leverage tool-agnostic software obfuscation practices to hide malicious functions and create unique code.
Q1: Read the above and continue to the next task.
Ans1: No answer needed
Q1: How many core layers make up the Layered Obfuscation Taxonomy?
Ans1: 4
Q2: What sub-layer of the Layered Obfuscation Taxonomy encompasses meaningless identifiers?
Ans2: Obfuscating Layout
Q1: What obfuscation method will break or split an object?
Ans1: Data Splitting
Q2: What obfuscation method is used to rewrite static data with a procedure call?
Ans2: Data Procedurization
Q1: What flag is found after uploading a properly obfuscated snippet?
Ans1: THM{koNC473n473_4Ll_7H3_7H1n95}
Q1: What are junk instructions referred to as in junk code?
Ans1: Code Stubs
Q2: What obfuscation layer aims to confuse an analyst by manipulating the code flow and abstract syntax trees?
Ans2: Obfuscating Controls
Q1: Can logic change and impact the control flow of a program? (T/F)
Ans1: T
Q1: What flag is found after properly reversing the provided snippet?
Ans1: THM{D3cod3d!!!}
Q1: What flag is found after uploading a properly obfuscated snippet?
Ans1: THM{Y0Ur_1NF0_15_M1N3}
Q1: Read the above and continue learning!
Ans1: No answer needed