Reverse Engineering Asked on December 21, 2021
I was wondering what are all the possible ways people can mess with the executable’s .rdata
strings ?
Because I’ve actualy seen it .. But I do not have any idea how they do that.
Some random dude made like a copy of My executable but with more strings (Files Names) on an [x] offset that falls into the .rdata
section, which caused the Executable to map more files in the memory …
How is that even possible ?
Get help from others!
Recent Questions
Recent Answers
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP