Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Slashdot Deals: Cyber Monday Sale Extended! Courses ranging from coding to project management - all eLearning deals 20% off with coupon code "CYBERMONDAY20". ×

Submission + - Hacker Bypasses Windows 7/8 Address Space Layout Randomization (paritynews.com)

hypnosec writes: Microsoft upped its security ante with Address Space Layout Randomization (ASLR) in Windows 7 and Windows 8 but, it seems that this mechanism to preventing hackers from jumping to a known memory location can be bypassed as a hacker has released a brilliant yet simple trick to circumvent the protection. Going by the name KingCope, the hacker who released a dozen exploits targeting MySQL, SSH last December, has detailed a mechanism through which ASLR of Windows 7, Windows 8 and probably other operating systems can be bypassed to load a DLL file with malicious instructions to a known address space. KingCope has explained the method in a blog post along with a PoC.
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Hacker Bypasses Windows 7/8 Address Space Layout Randomization

Comments Filter:

1000 pains = 1 Megahertz