# Case Changing ## Description Using case manipulation to evade detection of malicious content ## Attack Examples - Alternating letter case (e.g., aLtErNaTiNg) - Using all caps for certain words - Random case distribution - Using title case to hide patterns - Implementing case-based encoding - Using case as binary signals - Combining case changes with Unicode - Creating case-based patterns