The Current State of Exploit Development, Part 2

Read the original article: The Current State of Exploit Development, Part 2


black, white and red image of hands blocking hackers

In Part 1 of this two-part blog series, we addressed binary exploitation on Windows systems, including some legacy and contemporary mitigations that exploit writers and adversaries must deal with in today’s cyber landscape. In Part 2, we will walk through…

The post The Current State of Exploit Development, Part 2 appeared first on .


Read the original article: The Current State of Exploit Development, Part 2