Cybersecurity solutions for the whole lifecycle of IoT and embedded systems.| River Loop Security
Let’s set some background first. Back in Windows XP and prior, the mere existence of AppCompatCache (aka Shimcache) could be used to prove execution. A program wasn’t shimmed unless it was actually executed. This changed in Windows 7, 8, and 8.1 (presumably Vista as well, but nobody| ØSecurity
010 Editor | Pro Text/Hex Editor | Edit 200+ Formats | Reverse Engineering | Data Analysis| www.sweetscape.com
If you haven’t read the earlier parts, please do so: Part 1, Part 2, Part 3. Why Some time after hacking my head unit I came up with an idea. I wanted to create an application which added more features to the standard key fob. By this I mean by entering a certain code of locks, unlocks, or other button presses on the fob, would do something else in the vehicle like start the engine.| Programming With Style