Tuesday, September 12, 2017

Kernel Exploitation-Part 2

In Part-1 of this article series, we had reverse engineered the driver and identified buffer overflow vulnerability in it. In this part, we will cover the next step of developing the exploit, and for... Go on to the site to read the full article

from Kernel Exploitation-Part 2

No comments:

Post a Comment