 |
- ...LITCHFIELD:12.1
- However, exploits had been using
this technique prior to the publication, so it is unclear who
originally found the technique
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ... secure3.1
- For example, it should be possible to
overwrite the Handler with the address of some non-image
associated executable region, if one can be found
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ... miniscule4.1
- Where ``clean'' is defined as the best it can
get from a third-party perspective
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ... author's4.2
- Apologies for the shameless plug
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
|