Re: API used to access process heap structure
Re: API used to access process heap structure
- Subject: Re: API used to access process heap structure
- From: Pelle Johansson <email@hidden>
- Date: Fri, 8 Sep 2006 08:50:48 +0200
8 sep 2006 kl. 01.35 skrev email@hidden:
walking another process's memory heap smacks of
1. reverse engineering
Much easier done in a normal debugger, or by simply disassembling.
It's a perfectly legal reason, btw.
2. developing a buffer-overflow attack
Can't really argue here, it could be used for this.
or
3. trying to patch a memory-leak which is better done using a debugger
like Purify http://en.wikipedia.org/wiki/Purify
or
4. Cheating in games: http://www.brokenzipper.com/. Source code is
available, which should help the OP (see especially VMRegion.m). It
uses task_for_pid() though, so something has to be done to get around
that on Intel.
--
Pelle Johansson
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Darwin-dev mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
This email sent to email@hidden