What technique can an attacker use to obfuscate a malware application payload, allowing it to bypass standard security mechanisms?
A. Teredo tunnelling
B. Decryption
C. A PE32 header
D. Steganography
E. BASE64
What technique can an attacker use to obfuscate a malware application payload, allowing it to bypass standard security mechanisms?
A. Teredo tunnelling
B. Decryption
C. A PE32 header
D. Steganography
E. BASE64