Uninformed: Informative Information for the Uninformed

Vol 3» 2006.Jan


Conclusion

Implementation of a userland scheduler code allows to run an external code in a perfect harmony with the existing code. Taking an exploit scenario from any kind and adding this feature to it, can turn a normal straight forward shellcode to a backdoor and more.