Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The client certainly should have made sure their code was truly position independent.

Also, the client should have embedded their code in the executable file name so they just have to jump to the appropriate offset in argv[0]. This way, future updates just require renaming the file!



Why use PIC if you can just write your own relocator? https://fasterthanli.me/series/making-our-own-executable-pac...


I imagine they were dynamically building the code to inject, or why bother with the complexity?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: