• 0 Posts
  • 2 Comments
Joined 2 years ago
cake
Cake day: July 26th, 2023

help-circle
  • TheKMAP@lemmynsfw.comtoNo Stupid Questions@lemmy.world[Deleted]
    link
    fedilink
    English
    arrow-up
    10
    arrow-down
    2
    ·
    8 days ago

    If in the moment you’re replying to your own interpretation, you’re fine. But the second you overthink about their intentions, you will be freaking out, and that’s what the machine sees. One technique for bypassing lie detectors is to raise the baseline by flexing your butthole but there’s techniques to catch that, too.


  • Do you know what a memory stack and assembly are?

    If you want code that does assembly operations A, B, and then C, you might be able to accomplish it by scanning loaded memory (or its corresponding binary) for bits that, when translated into assembly, do:

    A

    D

    return

    This set of three instructions is a gadget. In practice, it’s a location in memory.

    And then you find another gadget.

    B

    C

    return

    Then, if you don’t care about D, or D does something irrelevant that won’t screw up what you’re trying to do, or won’t crash the program, you can replace the stack with the addresses of gadgets one and two. When gadget one returns, the stack is popped and then gadget two executes.

    Since the computer did ADBC and D was irrelevant, the system executed your ABC malware and now you win.

    Is finding gadgets that execute actual malware hard? Surprisingly not!