Dear Pals, Now that we have gone through many facets of hacking let us figure something out about the law governing Information Technology (IT) in India. The cyber world is governed by the Information Technology Act, 2000 in India.
Archive for July, 2010
While developing exploit, we need to overwrite EIP( Extended Instruction pointer) to change the flow of execution of program. Note: EIP contains the address of the memory which the processor is going to execute. Generally EIP is overwritten with the address of instructions like jmp esp, call , push ret etc. which point to our […]