lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 21 Sep 2007 13:32:21 -0400
From: "J. Oquendo" <sil@...iltrated.net>
To: bugtraq@...urityfocus.com
Subject: Re: [Mlabs] Dissecting Internals of Windows XP Svchost : Reverse
 Engineering Stature

Aditya K Sood wrote:
> Hi all
> 
> This is the reverse Engineering layout of Scvhost Internals.
> 
> |Category : Reverse Engineering Analysis.
> 
> The paper solely relates to the core internals that build up the
> Windows XP Svchost. The Svchost internals have not been disseminated
> into informative elements yet. I have found only one or two analysis
> but that wont satisfy my views regarding XP Svchost. The anatomy of
> Svchost has got complexity in its own term. This pushes me to write
> a specific analysis over it. The analysis provide a structural design
> with concept wise dissection. The point is to understand the hidden
> artifacts and how it affects the working aspect of prime service host
> controller.Every process is disseminated into primary process and
> secondary process. In terms related to operating system there is a parent
> process and its child. If one look at the implementation scenario then
> child processes are undertaken as thread internally. The kernel level
> implementation is subjugated like this. The XP Svchost runs as threads
> under services process.|
> 
> http://mlabs.secniche.org/winxp_svchost.html
> http://mlabs.secniche.org/papers/Win_Xp_Svc_Int.pdf
> 
> Regards
> Aks aka 0kn0ck
> http://mlabs.secniche.org | http://www.secniche.org


I'd like to know which of the genius moderators let this guy's
information get through. He's nothing more than a plagiarist passing bad
information to the community. Its shameful what Bugtraq has become. Has
anyone from there taken a look at the information this clown is posting
or someone asleep at the wheel.

-- 
====================================================
J. Oquendo
"Excusatio non petita, accusatio manifesta"

http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xF684C42E
sil . infiltrated @ net http://www.infiltrated.net


Download attachment "smime.p7s" of type "application/x-pkcs7-signature" (5157 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ