Eh, nothing really exciting or noteworthy in it. Could serve as a good overview, but there are better techniques actively being used that solves multiple other problems as well(ROP comes to mind, although not always). On Sun, Apr 15, 2012 at 11:01 AM, Levent Kayan <[email protected]> wrote: > a salam alaikum list, > > a nice written paper by TheXero, who wants to share y0u: > > "A paper discussing ASLR (Address Space Layout Randomization) and > techniques to evade the protection" > > you can find the paper at: http://www.nullsecurity.net/papers.html > > > cheers, > noobtrix > -- > Name: Levon 'noptrix' Kayan > E-Mail: [email protected] > GPG key: 0x014652c0 > Key fingerprint: ABEF 4B4B 5D93 32B8 D423 A623 823D 4162 0146 52C0 > Homepage: http://www.nullsecurity.net/ > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
