Forgot your password?
michael.jenkin, April 13, 2019 in The Green Room
followup to yesterdays video, pulling apart a Dotnet exe file
So what's the deal, how does an exe do anything inside a jpg? Surely any program that goes to open the image either just reads the image or rejects the file?
WIthout having watched this one - the trick with JPG executables was to encode the "picture" such that a stack overflow occurs which inadvertantly leads to their code being run.
A main preventitive of that is DEP which allows fencing off sections of memory to disallow programs wandering where they aren't supposed to.
You need to be a member in order to leave a comment
Sign up for a new account in our community. It's easy!
Already have an account? Sign in here.