Which attack method relies on encoding payloads so the shellcode is rewritten on each delivery to avoid pattern matching?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which attack method relies on encoding payloads so the shellcode is rewritten on each delivery to avoid pattern matching?

Explanation:
Polymorphic shellcode mutates the payload so the bytes change with every delivery, while keeping the same functionality. It uses an encoding/decoder approach where the shellcode is rewritten each time (often with a different key or stub), so static pattern-based detectors can’t rely on a fixed signature to identify it. When the code runs, the decoder reconstructs the original shellcode in memory and then executes it, preserving the attack’s effect despite the changing on-wire appearance. This contrasts with ASCII shellcodes, which focus on representing the payload in ASCII to fit certain input constraints but don’t inherently mutate the payload across deliveries; fragmentation splits the payload to evade certain filters but isn’t about encoding to avoid pattern matching; and signature-based NIDS refers to detection methods, not a delivery technique. The best fit is polymorphic shellcode because it centers on encoding and rewriting to dodge pattern matching.

Polymorphic shellcode mutates the payload so the bytes change with every delivery, while keeping the same functionality. It uses an encoding/decoder approach where the shellcode is rewritten each time (often with a different key or stub), so static pattern-based detectors can’t rely on a fixed signature to identify it. When the code runs, the decoder reconstructs the original shellcode in memory and then executes it, preserving the attack’s effect despite the changing on-wire appearance. This contrasts with ASCII shellcodes, which focus on representing the payload in ASCII to fit certain input constraints but don’t inherently mutate the payload across deliveries; fragmentation splits the payload to evade certain filters but isn’t about encoding to avoid pattern matching; and signature-based NIDS refers to detection methods, not a delivery technique. The best fit is polymorphic shellcode because it centers on encoding and rewriting to dodge pattern matching.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy