TransWikia.com

What are all possible ways to add strings to the .rdata section of a Binary Executable?

Reverse Engineering Asked on December 21, 2021

I was wondering what are all the possible ways people can mess with the executable’s .rdata strings ?

Because I’ve actualy seen it .. But I do not have any idea how they do that.

Some random dude made like a copy of My executable but with more strings (Files Names) on an [x] offset that falls into the .rdata section, which caused the Executable to map more files in the memory …

How is that even possible ?

Add your own answers!

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP