From 84280b04f322963cdf7761176f90dd51ea6cd68c Mon Sep 17 00:00:00 2001 From: xerox Date: Fri, 15 May 2020 23:18:02 +0000 Subject: [PATCH] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 9e54161..3c14186 100644 --- a/README.md +++ b/README.md @@ -28,7 +28,7 @@ If you are in any sort of doubt about the abundance of these drivers simply go t ### How does this exploit work? -Since we are able to read/write to any physical memory on the system the goal is to find the physical page of a syscall and map it into our process. This can be done by calculating the offset into the page in which the syscall resides. Doing so is trivial and only requires the modulus operation. +Since we are able to read/write to any physical memory on the system the goal is to find the physical page of a syscall. This can be done by calculating the offset into the page in which the syscall resides. Doing so is trivial and only requires the modulo operation. ```cpp auto syscall_page_offet = rva % 0x1000;