How did you manage to exploit the vuln? How did you dump it? Copy the
data and read dcache?

A dump for me, please! :-D
Gotta start software hacking right now...

Taylor Gordon schrieb:
> Some people on the channel seem to think it looks like mostly garbage, we'll
> have to take a second look at this.
> 
> On Wed, Jul 1, 2009 at 11:59 AM, Emmanuel Fleury <[email protected]> wrote:
> 
>> Hi all,
>>
>> By the way if some of you guys could quickly write some explanation of
>> what you did, I'll put it on the website.
>>
>> Regards
>> --
>> Emmanuel Fleury
>>
>> Learning without thinking is a waste.
>> Thinking without learning is dangerous.
>>  -- Confucius
>>
>> _______________________________________________
>> Linux4nano-dev mailing list
>> [email protected]
>> https://mail.gna.org/listinfo/linux4nano-dev
>> http://www.linux4nano.org
>>
> _______________________________________________
> Linux4nano-dev mailing list
> [email protected]
> https://mail.gna.org/listinfo/linux4nano-dev
> http://www.linux4nano.org
> 


_______________________________________________
Linux4nano-dev mailing list
[email protected]
https://mail.gna.org/listinfo/linux4nano-dev
http://www.linux4nano.org

Reply via email to