Room progress ( 0% )
Task 1Introduction
Task 2Origins of Obfuscation
Task 3Obfuscation's Function for Static Evasion
Task 4Object Concatenation
Task includes a deployable machine
Task 5Obfuscation's Function for Analysis Deception
Task 6Code Flow and Logic
Task 7Arbitrary Control Flow Patterns
Task 8Protecting and Stripping Identifiable Information
Task includes a deployable machine
Task 9Conclusion
Ready to learn Cyber Security? Create your free account today!
The Obfuscation Principles room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in