Reverse Engineering Asked by 0 x 5 4 4 D on July 24, 2020
I Was wondering What are all the possible ways people can mess with the executable’s .rdata Strings ?
Because I’ve actualy seen it .. But i do not have any idea how they do that .
Some random dude made like a copy of My executable but with more strings (Files Names) on an [x] offset that falls into .rdata section , which caused the Executable to map more files in the memory …
How is that even possible ?
Get help from others!
Recent Questions
Recent Answers
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP