Many thanks to Mr.Sketchymoose for giving me this blog post idea. Its a pretty basic concept but people generally use tools to figure it out. However, I thought it would be better to show how these tools work in a very general way, and also to show that yes YOU can do this yourself.
A lot of malware authors use XOR to obfuscate their code. Sometimes it ranges from 1 byte to 256 bytes.
read more...........http://sketchymoose.blogspot.com/2014/06/love-is-not-a8-d4-58-c4-study-in-xor.html
A lot of malware authors use XOR to obfuscate their code. Sometimes it ranges from 1 byte to 256 bytes.
read more...........http://sketchymoose.blogspot.com/2014/06/love-is-not-a8-d4-58-c4-study-in-xor.html