Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level
LPI Level 1
LPI Level 2
LPI Level 3
Contact
more sophisticated idss look for common shellcode signatures but even these systems can be bypassed by using polymorphic shellcode this is a technique common among virus writers
How does a polymorphic shellcode work?