Articles Blog | G5 Cyber Security

Research – How To Exploit Magic Values In 32-Bit Processes On 64-Bit OSes

This is a brief write-up on how magic values in 32-bit processes on 64-bit OSes work and how to exploit them.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/137597/magic-value.txt

Source: https://packetstormsecurity.com/files/137597/How-To-Exploit-Magic-Values-In-32-Bit-Processes-On-64-Bit-OSes.html

Exit mobile version