Welcome![Sign In][Sign Up]
Location:
Search - Joanna

Search list

[Hook apiSingle_Byte_Hooks

Description: Recently I rewatched Joanna s HITB presentation video and I noticed she said that a rootkit leveraging a single byte modification is impossible! Well I think that was a little bold to say and in my opinion it doesn t seem that infeasible that a one byte modification can be leveraged to accomplish something useful. -Recently I rewatched present Joanna s Box ation video and I noticed she said that a rootkit leveraging a single byte modification is impos quit! Well I think that was a little bold to say a nd in my opinion it doesn t seem that infeasible t hat a one byte modification can be leveraged to a ccomplish something useful.
Platform: | Size: 3019 | Author: inwing | Hits:

[Hook apiSingle_Byte_Hooks

Description: Recently I rewatched Joanna s HITB presentation video and I noticed she said that a rootkit leveraging a single byte modification is impossible! Well I think that was a little bold to say and in my opinion it doesn t seem that infeasible that a one byte modification can be leveraged to accomplish something useful. -Recently I rewatched present Joanna s Box ation video and I noticed she said that a rootkit leveraging a single byte modification is impos quit! Well I think that was a little bold to say a nd in my opinion it doesn t seem that infeasible t hat a one byte modification can be leveraged to a ccomplish something useful.
Platform: | Size: 3072 | Author: inwing | Hits:

[OtherBluepilling-the-Xen.pdf

Description: Bluepilling the Xen Hypervisor Joanna Rutkowska & Alexander Tereshkin Invisible Things Lab
Platform: | Size: 2129920 | Author: mielonemieso | Hits:

CodeBus www.codebus.net