Informative Information for the Uninformed | ||||||||||||||
|
||||||||||||||
ConclusionImplementation of a userland scheduler code allows to run an external code in a perfect harmony with the existing code. Taking an exploit scenario from any kind and adding this feature to it, can turn a normal straight forward shellcode to a backdoor and more.
|