Abuse Melding

Je hebt een klacht over de onderstaande posting:

09-08-2012, 17:11 door Anoniem

MS was al op de hoogte van de mogelijkheid om de beveiliging te omzeilen: http://blogs.technet.com/b/srd/archive/2012/07/24/emet-3-5-tech-preview-leverages-security-mitigations-from-the-bluehat-prize.aspx?Redirected=true Known limitations As stated above, as long as one of the critical functions is called then ROP checks will take place. It is possible for the attacker to circumvent this by not calling any of the hooked functions (for example directly calling into NTDLL and not kernel32) or just circumventing the hook. The following Phrack article presents many attack vectors that can be used to break those mitigations: http://www.phrack.org/issues.html?issue=62&id=5

Beschrijf je klacht (Optioneel):

captcha