exploit
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| exploit [2011/08/19 13:02] – [Two-staged l0dable exploit (unfinished)] nitram | exploit [2011/08/19 13:38] (current) – [The Keys] nitram | ||
|---|---|---|---|
| Line 94: | Line 94: | ||
| Thus it's possible to send l0dables (*.c0d). | Thus it's possible to send l0dables (*.c0d). | ||
| This could be an option for remote exploits, when combining with other vectors. | This could be an option for remote exploits, when combining with other vectors. | ||
| + | |||
| + | **Countermeasure: | ||
| ====== Two-staged l0dable exploit (unfinished) ====== | ====== Two-staged l0dable exploit (unfinished) ====== | ||
| We didn't were scared about the [[http:// | We didn't were scared about the [[http:// | ||
exploit.1313751745.txt.gz · Last modified: by nitram
