Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Re: Entry point analysis
Oct 28 2005 12:26PM
David Perez-Conde (david perez conde gmail com)
In the official report (and also in some of the submissions) of
scan#32 I remember we included in the code analysis section a pretty
detailed description of how to obtain an uncompressed version of the
binary using a debugger, finding the original entry point, dumping th...
[ more ]
Copyright 2010, SecurityFocus