Re: API used to access process heap structure
site_archiver@lists.apple.com Delivered-To: darwin-dev@lists.apple.com 8 sep 2006 kl. 01.35 skrev Stewart.Dickson@noaa.gov: walking another process's memory heap smacks of 1. reverse engineering Can't really argue here, it could be used for this. or 3. trying to patch a memory-leak which is better done using a debugger like Purify http://en.wikipedia.org/wiki/Purify Much easier done in a normal debugger, or by simply disassembling. It's a perfectly legal reason, btw. 2. developing a buffer-overflow attack or 4. Cheating in games: http://www.brokenzipper.com/. Source code is available, which should help the OP (see especially VMRegion.m). It uses task_for_pid() though, so something has to be done to get around that on Intel. -- Pelle Johansson _______________________________________________ Do not post admin requests to the list. They will be ignored. Darwin-dev mailing list (Darwin-dev@lists.apple.com) Help/Unsubscribe/Update your Subscription: http://lists.apple.com/mailman/options/darwin-dev/site_archiver%40lists.appl... This email sent to site_archiver@lists.apple.com
participants (1)
-
Pelle Johansson