- Joined
- Jul 7, 2010
- Messages
- 3,882
- Trophies
- 2
- Location
- /dev/random
- Website
- www.gudenau.net
- XP
- 5,379
- Country
So at the moment this is mainly just some questions and me checking my information.
The current exploit relies on the user's ds profile being crafted in such a way that the user name reads past the name portion. It the smashes the stack and uses ROP to take control of the system. In order to get to the NATIVE_FIRM processor it replaces interrupts to take control.
So, how does this stack up against how it realy works?
The current exploit relies on the user's ds profile being crafted in such a way that the user name reads past the name portion. It the smashes the stack and uses ROP to take control of the system. In order to get to the NATIVE_FIRM processor it replaces interrupts to take control.
So, how does this stack up against how it realy works?