top of page
book of spells.webp

Start your journey towards mastering the CLI with our FREE Command Line Book of Spells.

By entering your email address you agree to receive emails from Command Line Wizardry. We'll respect your privacy and you can unsubscribe at any time.

  • Writer's pictureCybersecurity Ops with bash

Cybersecurity Ops with bash - Chapter 14 Solutions

Below are selected solutions for the Chapter 14 workshop questions from Cybersecurity Ops with bash. Note - These are just examples, many possible solutions exist.

Question 2

Obfuscate the following script by using the techniques described earlier to make it difficult to follow.


You can use logic obfuscation to make even this simple script challenging to trace. Here is an example.

The output of both scripts is exactly the same. See if you can trace through the code and figure out how it works. Hint - the ^ character is the exclusive-or operator in bash.

As you can see, logic obfuscation makes tracing the script more difficult, but it is not an impossible task. This technique simply slows down the reverse engineering process. However, you can combine logic obfuscation with encryption to create a formidable challenge.

363 views0 comments


bottom of page