A threat actor attempts to avoid detection by turning data into a code that shifts numbers to the right four times. Which anti-forensics technique is being used?
#:~:text=Obfuscation%20of%20character%20strings%20is,data%20when%20the%20code%20executes.
Currently there are no comments in this discussion, be the first to comment!