Selasa, 14 Februari 2006

Modifying exe's to dll's for firewall bypass

well, as it's a cloudy sat morning, i might as well do the next installment in this little series on firewall bypass.let's review what we now know.We have a exe like explorer.exe which the end user trusts explicitly. If the software firewall tells Mr X that explorer.exe needs to access the internet, the user is unlikely to disagree.The malicious hacker has a special program called injector.exe

0 komentar:

Posting Komentar