Location:
Search - Joanna
Search list
Description:
Recently I rewatched Joanna s HITB presentation video and I noticed she said that a rootkit leveraging a single byte modification is impossible! Well I think that was a little bold to say and in my opinion it doesn t seem that infeasible that a one byte modification can be leveraged to accomplish something useful.
-Recently I rewatched present Joanna s Box ation video and I noticed she said that a rootkit leveraging a single byte modification is impos quit! Well I think that was a little bold to say a nd in my opinion it doesn t seem that infeasible t hat a one byte modification can be leveraged to a ccomplish something useful.
Platform: |
Size: 3019 |
Author: inwing |
Hits:
Description:
Recently I rewatched Joanna s HITB presentation video and I noticed she said that a rootkit leveraging a single byte modification is impossible! Well I think that was a little bold to say and in my opinion it doesn t seem that infeasible that a one byte modification can be leveraged to accomplish something useful.
-Recently I rewatched present Joanna s Box ation video and I noticed she said that a rootkit leveraging a single byte modification is impos quit! Well I think that was a little bold to say a nd in my opinion it doesn t seem that infeasible t hat a one byte modification can be leveraged to a ccomplish something useful.
Platform: |
Size: 3072 |
Author: inwing |
Hits:
Description: Bluepilling the Xen
Hypervisor
Joanna Rutkowska & Alexander Tereshkin
Invisible Things Lab
Platform: |
Size: 2129920 |
Author: mielonemieso |
Hits: