A threat actor attempts to avoid detection by turning data into a code that shifts numbers to the right four times. Which anti-forensics technique is being used?
#:~:text=Obfuscation%20of%20character%20strings%20is,data%20when%20the%20code%20executes.
Juan
7 months agoAn
7 months agoYuriko
7 months agoCoral
7 months agoMireya
6 months agoMartina
6 months agoShelba
6 months agoAnnett
7 months agoGilberto
7 months agoLoreen
7 months agoAshton
7 months agoRoyce
8 months agoAn
8 months ago