top | item 21174534 (no title) hleach | 6 years ago So yes, you are correct it's being encrypted dynamically at the hardware level.You just debug in a system without these protections turned on then. discuss order hn newest monocasa|6 years ago No, I'm saying you don't have to turn off these protections.Like, can you give an example of a debugging task you have carried out that requires reading the code segment of the running process? hleach|6 years ago Required? No, but I didn't say impossible. I said "more difficult".Made easier by? Most everything ever loaded in a debugger. load replies (1)
monocasa|6 years ago No, I'm saying you don't have to turn off these protections.Like, can you give an example of a debugging task you have carried out that requires reading the code segment of the running process? hleach|6 years ago Required? No, but I didn't say impossible. I said "more difficult".Made easier by? Most everything ever loaded in a debugger. load replies (1)
hleach|6 years ago Required? No, but I didn't say impossible. I said "more difficult".Made easier by? Most everything ever loaded in a debugger. load replies (1)
monocasa|6 years ago
Like, can you give an example of a debugging task you have carried out that requires reading the code segment of the running process?
hleach|6 years ago
Made easier by? Most everything ever loaded in a debugger.