Which endpoint security bypass technique modifies the assembly of an executable?
Which endpoint security bypass technique modifies the assembly of an executable?
Ghostwriting involves modifying the assembly of an executable to bypass endpoint security measures. This technique allows attackers to change the internal structure of the code without altering its external behavior, thus evading detection by security software.
Correct answer should be D
Ghostwriting - modifying the assembly of an executable in order to bypass
Ghostwriting is correct.