Chapter 5 Manipulating the Runtime
Information in this chapter
The preceding chapters examined methods and tools for modifying runtime behavior. But deciding what to manipulate is not easy, especially when dealing with a large codebase. This chapter explains three manipulation techniques and when they typically are used. For instance, the runtime logic is manipulated to describe attacks targeted at a specific behavior of the runtime. The runtime’s execution flow is manipulated when the attacker's target was supposed to hook into specific places during application execution, and to control when to perform specific operations (rather than what to perform). ...
Get Managed Code Rootkits now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.