Plateforme Level Extreme
Abonnement
Profil corporatif
Produits & Services
Support
Légal
English
ReFox
Message
De
31/08/2007 12:36:41
Walter Meester
HoogkarspelPays-Bas
 
 
À
31/08/2007 02:28:43
Information générale
Forum:
Visual FoxPro
Catégorie:
Produits tierce partie
Titre:
Re: ReFox
Divers
Thread ID:
01251482
Message ID:
01251751
Vues:
74
Hi Jos,


>>I suspect this is not that simple for VFP executables. Making a memory dump won't get you a full VFP exe. This is because a VFP.exe is reading from itself (the p-code) as it is run. Depending on how a user uses the software it will load resources (forms, classes, prgs, reports, icons, etc) randomly so the memory dump will be differrent every time you make it.
>
>I don't say its simple. Dumping any running app from memory requires uncommon skills. And no doubt a single dump would not do it. But it is a definite attack and very difficult to defend against.

What I'm saying is that it might be pretty impossible to do it through a memory dump, because for the hacker there might not be a way to get the whole exe in memory. Even then it might be pretty impossible as the resources might be handled like data and therefore totally fragmented and scattered throughout the memory. To be honest, I think it is impossible to reconstruct the whole EXE from memory at all.

Christof wrote some article about this very same topic. Maybe its on his website. AFAIK, the main security hole in VFP applications is writing code that might be run by the executable. For example modifying the database stored procedures, triggers or field validation rules that will have access to the resources in an unencrypted form. From these kind of hacks you can copy out the resources (though I do not have a clue how to get a list of all the resources that are compiled in there).

Walter,
Précédent
Suivant
Répondre
Fil
Voir

Click here to load this message in the networking platform