Security Incidents mailing list archives
Re: Tools to analyze "captured" binaries?
From: peak () ARGO TROJA MFF CUNI CZ (Pavel Kankovsky)
Date: Sun, 23 Apr 2000 00:08:26 +0200
On Thu, 20 Apr 2000, karthik krishnamurthy wrote:
from the attacker's viewpoint, wont a statically linked trojan more conspicous because of its size.
you can link it with a stripped-down version of libc.a (unless you are a dumb script kiddie, of couse) --Pavel Kankovsky aka Peak [ Boycott Microsoft--http://www.vcnet.com/bms ] "Resistance is futile. Open your source code and prepare for assimilation."
Current thread:
- Tools to analyze "captured" binaries? Anton Chuvakin (Apr 19)
- (no subject) Peter Eriksson (Apr 20)
- (no subject) Del (Apr 20)
- Re: Tools to analyze "captured" binaries? Pavel Kankovsky (Apr 20)
- Re: Tools to analyze "captured" binaries? Rob Lee (Apr 20)
- <Possible follow-ups>
- Re: Tools to analyze "captured" binaries? Living Prophet of the GREAT GRUG (Apr 20)
- Re: Tools to analyze "captured" binaries? karthik krishnamurthy (Apr 20)
- Re: Tools to analyze "captured" binaries? Pavel Kankovsky (Apr 22)
- (no subject) Peter Eriksson (Apr 20)