Informative Information for the Uninformed | ||||||||||||||
|
||||||||||||||
EncoderWhen utilizing a context-key, the method of encoding is largely unchanged from current methods. The exploit crafter simply passes the encoding function the context-key as its static key value. The size of the context-key is dependent upon the requirements of the encoder being used; however, it is feasible that the key may be of any fixed length, or ideally the same size as the payload being encoded.
|