In Part-1 of this article series, we had reverse engineered the driver and identified buffer overflow vulnerability in it. In this part, we will cover the next step of developing the exploit, and for... Go on to the site to read the full article
from Kernel Exploitation-Part 2
No comments:
Post a Comment