CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - Joanna
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - Joanna - List
[
Hook api
]
Single_Byte_Hooks
DL : 0
Recently I rewatched Joanna s HITB presentation video and I noticed she said that a rootkit leveraging a single byte modification is impossible! Well I think that was a little bold to say and in my opinion it doesn t seem that infeasible that a one byte modification can be leveraged to accomplish something useful. -Recently I rewatched present Joanna s Box ation video and I noticed she said that a rootkit leveraging a single byte modification is impos quit! Well I think that was a little bold to say a nd in my opinion it doesn t seem that infeasible t hat a one byte modification can be leveraged to a ccomplish something useful.
Update
: 2008-10-13
Size
: 2.95kb
Publisher
:
inwing
[
Hook api
]
Single_Byte_Hooks
DL : 0
Recently I rewatched Joanna s HITB presentation video and I noticed she said that a rootkit leveraging a single byte modification is impossible! Well I think that was a little bold to say and in my opinion it doesn t seem that infeasible that a one byte modification can be leveraged to accomplish something useful. -Recently I rewatched present Joanna s Box ation video and I noticed she said that a rootkit leveraging a single byte modification is impos quit! Well I think that was a little bold to say a nd in my opinion it doesn t seem that infeasible t hat a one byte modification can be leveraged to a ccomplish something useful.
Update
: 2025-02-17
Size
: 3kb
Publisher
:
inwing
[
Other
]
Bluepilling-the-Xen.pdf
DL : 0
Bluepilling the Xen Hypervisor Joanna Rutkowska & Alexander Tereshkin Invisible Things Lab
Update
: 2025-02-17
Size
: 2.03mb
Publisher
:
mielonemieso
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.