Sunday, January 27, 2013

Attacking the Windows 7/8 Address Space Randomization

      Microsoft upped its security ante with Address Space Layout Randomization (ASLR) in Windows 7 and Windows 8, but it seems this mechanism to prevent hackers from jumping to a known memory location can be bypassed. A hacker has released a brilliant, yet simple trick to circumvent this protection. KingCope, a hacker who released several exploits targeting MySQL in December, has detailed a mechanism through which the ASLR of Windows 7, Windows 8 and probably other operating systems can be bypassed to load a DLL file with malicious instructions to a known address space.

Read more: Slashdot
Read more: kingcopes´ blag
QR: Inline image 1

Posted via email from Jasper-Net