Obfuscation and Deobfuscation part 2 ?
In the previous blog which you can read here we had covered topics like : What is obfuscation ? What is deobfuscation ? What is the need of deobfuscation ? In this blog we will be covering common techniques of obfuscation and deobfuscation . Common Obfuscation Techniques Before understanding deobfuscation it is very well important to know about tools and techniques that the villain ( obfuscation ) is going to use against us int the war. 1. Encoding & Encryption Obfuscation: Simple encodings like Base64 , ROT13 , or XOR with a key are used to hide strings and payloads. The code often contains a decoder function that runs just before the payload is used. Deobfuscation: Identify the Encoding: Look for patterns (e.g., == at the end for Base64). Use Standard Tools: Use built-in language functions ( atob() in JavaScript for Base64) or online decoders. Find the Key: For XOR, the ana...