Polymorphic code: Difference between revisions

Content deleted Content added
added some information, erased some other..
m spelling edits
Line 2:
 
This is sometimes used by [[computer virus]]es, [[shellcode]]s and [[computer worm]]s to hide their presence.
Most [[anti virus-software]] and [[intrusion detection system]]s tries to find malicious code by searching through computer files and data packets sent over a [[computer network]]. If the security software finds any pattern that corresponds to an allreadyalready known virus or worm, it reacts and erases the program.
It cannot, however, find the program if it constantly mutates so that it never looks the same. This is the very idea of polymorphic code.
 
Line 33:
some_random_number
 
The same algorithm, but with lots of unnessisaryunnecessary C-altering codes..
Start: