The sections of Portable Executable files are tagged with differents flags. Can someone explain the difference between IMAGE_SCN_MEM_EXECUTE (the section can be executed as code) and IMAGE_SCN_CNT_CODE (the section contains executable code)? Thanks.
相关问题
- ELF Relocation reverse engineering
- Reverse engineer Ceasar cipher
- Reverse Engineering HTTP request
- How to call non-exported functions of a DLL?
- Dump Flash Memory through a single GPIO pin
相关文章
- Laravel generate models, views and controllers fro
- I cannot add views when reverse engineering my dat
- Wrapping Visual C++ in C#
- PE Format - IAT Questions
- Find out CRC or CHECKSUM of RS232 data
- How can `kernel32.dll` export an ordinal of 0, whe
- Can anyone define the Windows PE Checksum Algorith
- Anyone know of a decent free DB schema reverse eng
IMAGE_SCN_MEM_EXECUTE is the one that is actually used by the PE loader to set up page permissions. IMAGE_SCN_CNT_CODE is not used, I guess it's just a descriptive flag.