lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <BAY12-F879NN4mCikGg00001dc0@hotmail.com>
From: randnut at hotmail.com (first last)
Subject: MyDoom download info

> > to successfully unpack the program. All they really needed to
> > do was dump it from memory while it was running and they could've
>analyzed
> > it immediately with any disassembler.
>
>Forgive me, I am no assembly hacker nor much of a programmer,
>but would it be possible for a program to 'react' in some way
>were one to try to dump it from memory?

The program would have to use a device driver to protect itself from not 
being dumped from memory to disk. But there are ways around that as well.

_________________________________________________________________
Get a FREE online virus check for your PC here, from McAfee. 
http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ