Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Submission + - Hacker Bypasses Windows 7/8 Address Space Layout Randomization (

hypnosec writes: Microsoft upped its security ante with Address Space Layout Randomization (ASLR) in Windows 7 and Windows 8 but, it seems that this mechanism to preventing hackers from jumping to a known memory location can be bypassed as a hacker has released a brilliant yet simple trick to circumvent the protection. Going by the name KingCope, the hacker who released a dozen exploits targeting MySQL, SSH last December, has detailed a mechanism through which ASLR of Windows 7, Windows 8 and probably other operating systems can be bypassed to load a DLL file with malicious instructions to a known address space. KingCope has explained the method in a blog post along with a PoC.
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Hacker Bypasses Windows 7/8 Address Space Layout Randomization

Comments Filter:

"This generation may be the one that will face Armageddon." -- Ronald Reagan, "People" magazine, December 26, 1985