Interesting read! Thanks Ryan! At least they tried? :) -Rob On Mon, Jan 28, 2013 at 1:14 PM, Ryan Dunlop <ryan.c.dunlop at gmail.com>wrote: > * > > * > *"BUT - they memory allocation unit in the OS now allocates memory > randomly, which apparently thwarts most of the attacks against device > drivers and such that previous versions of windows were susceptible too. > This apparently is pointing to a brighter future for online gaming in > terms of making it harder for people to cheat." * > > > http://kingcope.wordpress.com/2013/01/24/attacking-the-windows-78-address-space-randomization/ > > Quoting the site: > > "Though in many cases it is possible to completely bypass Windows 7 and especially Windows 8 ASLR by using the > techniques." > > "Testcases have shown that Windows 8 behaves more vulnerable to the method than > Windows 7. In Windows 8 the DLL will be loaded at the very low address 0x10000 > and more reliable than in Windows 7." > > > > _______________________________________________ > TCLUG Mailing List - Minneapolis/St. Paul, Minnesota > tclug-list at mn-linux.org > http://mailman.mn-linux.org/mailman/listinfo/tclug-list > > -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mailman.mn-linux.org/pipermail/tclug-list/attachments/20130128/e0bb2a92/attachment.html>