How did you manage to exploit the vuln? How did you dump it? Copy the data and read dcache?
A dump for me, please! :-D Gotta start software hacking right now... Taylor Gordon schrieb: > Some people on the channel seem to think it looks like mostly garbage, we'll > have to take a second look at this. > > On Wed, Jul 1, 2009 at 11:59 AM, Emmanuel Fleury <[email protected]> wrote: > >> Hi all, >> >> By the way if some of you guys could quickly write some explanation of >> what you did, I'll put it on the website. >> >> Regards >> -- >> Emmanuel Fleury >> >> Learning without thinking is a waste. >> Thinking without learning is dangerous. >> -- Confucius >> >> _______________________________________________ >> Linux4nano-dev mailing list >> [email protected] >> https://mail.gna.org/listinfo/linux4nano-dev >> http://www.linux4nano.org >> > _______________________________________________ > Linux4nano-dev mailing list > [email protected] > https://mail.gna.org/listinfo/linux4nano-dev > http://www.linux4nano.org > _______________________________________________ Linux4nano-dev mailing list [email protected] https://mail.gna.org/listinfo/linux4nano-dev http://www.linux4nano.org
