To access material, start machines and answer questions login.
Obfuscation is an essential component of detection evasion methodology and preventing analysis of malicious software. Obfuscation originated to protect software and intellectual property from being stolen or reproduced. While it is still widely used for its original purpose, adversaries have adapted its use for malicious intent.
In this room, we will observe obfuscation from multiple perspectives and break down obfuscation methods.
Learning Objectives
- Learn how to evade modern detection engineering using tool-agnostic obfuscation
- Understand the principles of obfuscation and its origins from intellectual property protection
- Implement obfuscation methods to hide malicious functions
Before beginning this room, familiarize yourself with basic programming logic and syntax. Knowledge of C and is recommended but not required.
We have provided several machines with the required files and web servers to complete this room. Using the credentials below, you can access the machine and web server in-browser or through .
Machine IP: MACHINE_IP Username: Student Password: TryHackMe!
This is going to be a lot of information. Please put on your evil helmets and locate your nearest fire extinguisher.
Ready to learn Cyber Security?
The Obfuscation Principles room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
