Writing Exploits with the Elderwood Kit (Part 2)

In the final part of our three-part series, we investigate the how the toolkit user gained control of program flow and what their strategy means for the reliability of their exploit. Elderwood and the Department of Labor Hack Writing Exploits with the Elderwood Kit (Part 1) Writing Exploits with the Elderwood Kit (Part 2) Last time, … Continue reading Writing Exploits with the Elderwood Kit (Part 2)