Read the original article: The Current State of Exploit Development, Part 2
In Part 1 of this two-part blog series, we addressed binary exploitation on Windows systems, including some legacy and contemporary mitigations that exploit writers and adversaries must deal with in today’s cyber landscape. In Part 2, we will walk through…
The post The Current State of Exploit Development, Part 2 appeared first on .
Read the original article: The Current State of Exploit Development, Part 2