Comment by axelriet
7 years ago
That sounds reasonable (symbols inadvertently leaked). This would be a plausible explanation for at least some of the naming similarities.
7 years ago
That sounds reasonable (symbols inadvertently leaked). This would be a plausible explanation for at least some of the naming similarities.
https://www.youtube.com/watch?v=2D9ExVc0G10&t=9m53s
The above link points to: “OffensiveCon19 - Alex Ionescu - Keynote - Reversing Without Reversing” and to 9th minute of the talk where it’s very relevant to the current discussion.
Someone pointed to that earlier. Great talk about how he gathers information to write his books.
See again what I quoted up in the thread related to the NSAKEY:
“Windows NT 4 Service Pack 5 (which had been released unstripped of its symbolic debugging data)”