<div dir="ltr"><br><div style>Interesting read! Thanks Ryan! </div><div style><br></div><div style>At least they tried? :) </div><div style><br></div><div style>-Rob</div><div style><br></div></div><div class="gmail_extra">
<br><br><div class="gmail_quote">On Mon, Jan 28, 2013 at 1:14 PM, Ryan Dunlop <span dir="ltr"><<a href="mailto:ryan.c.dunlop@gmail.com" target="_blank">ryan.c.dunlop@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<i><br><br></i><div class="gmail_quote"><i>"BUT - they memory allocation unit in the OS now allocates memory randomly, which apparently thwarts most of the attacks against device drivers and such that previous versions of windows were susceptible too. This apparently is pointing to a brighter future for online gaming in terms of making it harder for people to cheat." </i><br>
<br><a href="http://kingcope.wordpress.com/2013/01/24/attacking-the-windows-78-address-space-randomization/" target="_blank">http://kingcope.wordpress.com/2013/01/24/attacking-the-windows-78-address-space-randomization/</a><br>
<br>Quoting the site: <br>
<br><pre><font size="4">"Though in many cases it is possible to<font size="4"> </font>completely bypass Windows 7 and especially Windows 8 ASLR by using the
techniques."</font></pre><pre><font size="4">"Testcases have shown that Windows 8 behaves more vulnerable to the method than
Windows 7. In Windows 8 the DLL will be loaded at the very low address 0x10000
and more reliable than in Windows 7."</font></pre></div><br>
<br>_______________________________________________<br>
TCLUG Mailing List - Minneapolis/St. Paul, Minnesota<br>
<a href="mailto:tclug-list@mn-linux.org">tclug-list@mn-linux.org</a><br>
<a href="http://mailman.mn-linux.org/mailman/listinfo/tclug-list" target="_blank">http://mailman.mn-linux.org/mailman/listinfo/tclug-list</a><br>
<br></blockquote></div><br></div>