Session 11 – Practical Reversing Part VI – Exploit Development [advanced]

This session will discuss some protections added by the operating systems and processors to mitigate the exploitation, after that, also present some ways to bypass those protections.


No Comments Yet

Leave a Reply

Your email address will not be published. Required fields are marked *

site social