Interesting read!  Thanks Ryan!

At least they tried? :)

-Rob



On Mon, Jan 28, 2013 at 1:14 PM, Ryan Dunlop <ryan.c.dunlop at gmail.com>wrote:

> *
>
> *
> *"BUT - they memory allocation unit in the OS now allocates memory
> randomly, which apparently thwarts most of the attacks against device
> drivers and such that previous versions of windows were susceptible too.
>  This apparently is pointing to a brighter future for online gaming in
> terms of making it harder for people to cheat."  *
>
>
> http://kingcope.wordpress.com/2013/01/24/attacking-the-windows-78-address-space-randomization/
>
> Quoting the site:
>
> "Though in many cases it is possible to completely bypass Windows 7 and especially Windows 8 ASLR by using the
> techniques."
>
> "Testcases have shown that Windows 8 behaves more vulnerable to the method than
> Windows 7. In Windows 8 the DLL will be loaded at the very low address 0x10000
> and more reliable than in Windows 7."
>
>
>
> _______________________________________________
> TCLUG Mailing List - Minneapolis/St. Paul, Minnesota
> tclug-list at mn-linux.org
> http://mailman.mn-linux.org/mailman/listinfo/tclug-list
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.mn-linux.org/pipermail/tclug-list/attachments/20130128/e0bb2a92/attachment.html>