28Eki
Syscall manipulation
What are some known methods where attackers, by changing just a single value (like rax in x86_64, which is the syscall number) they can change the entire nature of the syscall?
What are some known methods where attackers, by changing just a single value (like rax in x86_64, which is the syscall number) they can change the entire nature of the syscall?