June 2018
Beginner
510 pages
13h 7m
English
Most of the time, attackers use very simple encoding algorithms such as Base64 encoding or xor encryption to obscure the data. The reason why attackers use simple algorithms because they are easy to implement, takes fewer system resources, and are just enough to obscure the content from the security products and the security analyst.