Update README.md

merge-requests/1/head
xerox 5 years ago
parent c3561ccbe7
commit 6527f71209

@ -28,7 +28,7 @@ If you are in any sort of doubt about the abundance of these drivers simply go t
### How does this exploit work? ### How does this exploit work?
Since we are able to read/write to any physical memory on the system the goal is to find the physical page of a syscall and map it into our system. This can be done by calculating the offset into the page in which the syscall resides. Doing so is trivial and only requires the modulus operation. Since we are able to read/write to any physical memory on the system the goal is to find the physical page of a syscall and map it into our process. This can be done by calculating the offset into the page in which the syscall resides. Doing so is trivial and only requires the modulus operation.
```cpp ```cpp
auto syscall_page_offet = rva % 0x1000; auto syscall_page_offet = rva % 0x1000;

Loading…
Cancel
Save