Know Your Malware Part Two – Hacky Obfuscation Techniques

In the first post in this series, we covered common PHP encoding techniques and how they’re used by malware to hide from security analysts and scanners. In today’s post, we’re going to dive a little bit deeper into other obfuscation techniques that make use of other features available in PHP.

This post was originally published on Wordfence by Ram Gall.

Follow us

Don't be shy, get in touch. We love meeting interesting people and making new friends.