Content deleted Content added
Added a few tweaks to the text Tags: Reverted Mobile edit Mobile web edit |
→Types: Added content Tags: Reverted Mobile edit Mobile web edit |
||
Line 43:
Pivoting is usually done by infiltrating a part of a network infrastructure (as an example, a vulnerable printer or thermostat) and using a scanner to find other devices connected to attack them. By attacking a vulnerable piece of networking, an attacker could infect most or all of a network and gain complete control.
===Bytecode Through Loadstring Function===
When Lua runs programs, the Lua virtual machine compiles code to Lua bytecode before it is interpreted. This process is irreversible without artifacts (via decompilation) and thus was frequently used for Code Obfuscation in order to manipulate the games memory,mostly in Roblox for example.
==See also==
|