Question: A penetration tester has written an application that performs bit-by-bit XOR 0xFF operation on binaries prior to transmission over untrusted media. Which of the following
A penetration tester has written an application that performs bit-by-bit XOR 0xFF operation on binaries prior to transmission over untrusted media. Which of the following best describes the action performed by this type of application?
Hashing
Key Exchange
Encryption
Obfuscation
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
