Mark, a professional hacker, targeted an eccouncil video
ethical-hacker video for mark, a professional hacker, targeted an organization’s network to gain remote access. For this reason, he employed a technique to
Answer
          Full Certification Question
Mark, a professional hacker, targeted an organization’s network to gain remote access. For this reason, he employed a technique to modify the structure of the malware code and append arbitrary code without affecting its functionality. This technique helped him in bypassing endpoint security agents. Which of the following techniques did Mark employ in the above scenario?