neilhard...@gmail.com:
> So you're saying that you can run an entire Xen exploit without installing
> anything to the hard drive at all... Just purely run it in the RAM itself.
Well, most GNU/Linux systems have a /tmp/ partition, which acts like a
hard drive but is backed by RAM. So even if you
So you're saying that you can run an entire Xen exploit without installing
anything to the hard drive at all... Just purely run it in the RAM itself.
Wow.
And what do you think about Selfrando..?
Is this going to fix browser exploits once and for all, or will it just fall to
hackers..?
https:
neilhard...@gmail.com:
> I have a question about Whonix/Tor Browser exploits.
>
> I have played around a bit with Metasploit to see how browser exploits work.
>
> They basically rig a web page with exploits, and then it does what's known as
> "arbitrary code execution", to open up a "remote shel
I have a question about Whonix/Tor Browser exploits.
I have played around a bit with Metasploit to see how browser exploits work.
They basically rig a web page with exploits, and then it does what's known as
"arbitrary code execution", to open up a "remote shell".
As far as I can tell.. the rem