#IMAGE_FILE_HEADER

PE-Crypters : uno sguardo da vicino al c.d. "formato" PE

DrWatson's profile picture
Published in 
 · 13 May 2018
... la funzione di identificare il tipo di eseguibile e il S.O. (o sottosistema per NT) a cui e' destinato l'eseguibile; ad esempio : IMAGE_OS2_SIGNATURE 0x0454E = NE = new executable = os/2 o win3x IMAGE_NT_SIGNATURE 0x000004550 = PE00 = win9x / winNT #IMAGE_FILE_HEADER# * Machine: indica il processore target (ricordate che NT e' multiplatform) * TimeDateStamp: time stamp usata per identificare la versione del modulo (ad esempio nel meccanismo di import binding), ma spesso inconsistente. Non fidatevi! * NumberOfSec ...
loading
Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT