Just two quick questions about DCOM exploit code (Please excuse my ignorance):

1) Why did each request have to be coded in assembly?
and
2) Was each request hand coded or are there tools that help them to construct each request in assembly?


Much appreciated!

_________________________________________________________________
Hot chart ringtones and polyphonics. Go to http://ninemsn.com.au/mobilemania/default.asp


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to