DeletedUser237 How do you know what code was there in the first place?
I didn't say that and it's not relevant anyway.
DeletedUser237 Malware is not just an executable.
Malware = malicious software
Software (in this context) = executable program
DeletedUser237 stego is used not just to bypass AV, it can be used to bypass IDS, IPS, FW or WAF
All the same, doesn't matter.
DeletedUser237 I never said it is successful at bypassing it. I just said it is used as one method of doing so. you're arguing about semantics , not grasping the concept we discuss.
I grasp the concept very well. Steganography is not a form of attack, it's a form of obscurity. It's also inherently not fully successful because the malware needs to be changed into its unobscured form automatically at some point in order to execute with no human intervention once its entry point is executed. This is no different than using encryption — either the entire malware is encrypted and then it can't execute without the user knowing how to decrypt it, or most of it is encrypted but there's a component that decrypts it.
An exploit is not a form of obscurity to evade detection, it's a form of attack.