Lenny says no. I tend to agree, just because Apple switched to intel isn't going to make shellcode easier to code from processor to processor. It just the fact that the kernel is more secure, has a built in firewall... etc..
"One other argument for why it's easier to exploit x86 chips is the old CISC vs. RISC debate, but essentially in reverse. The notion is that it's easier to program CISC processors in assembly language, so it's easier to write exploit code. This has only the slightest suggestion of truth to it.
On top of being largely irrelevant, it's not even as true as it might seem. The PowerPC instruction set is famous for being the most complex of RISC instruction sets. It does have many RISC characteristics like regular instruction formats (all 32-bit), but it does many unRISCy things, like permitting misaligned data access."
Good point.
Joel Esler, Sourcefire, Snort, Immunet, ClamAV, Apple, and Network Security. This is my blog.
Subscribe to:
Post Comments (Atom)
Call of Duty Error 6034 for the Xbox
Several friends and I play Call of Duty nearly every night. However, Activision’s most recent multiplayer update broke the heck out of Call...
-
Without going off the deep-end here and discussing every single Snort rule keyword, I just wanted to touch on a few modifiers that people so...
-
Let me start off by saying I'm not bashing the writer of this article, and I'm trying not to be super critical. I don't want to...
-
What kind of crap is this? "Effective December 1st, 2007, all new GIAC certification attempts and re-certification attempts are require...
No comments:
Post a Comment