What are the techniques for exploiting computers today?
Posted
by LM
on Stack Overflow
See other posts from Stack Overflow
or by LM
Published on 2010-06-05T19:42:44Z
Indexed on
2010/06/05
19:52 UTC
Read the original article
Hit count: 159
I've just read "Hacking: The Art of Exploitation" and I'm interested in this subject. The thing is, this book seems irrelevant to hacking now that OSes have non-executable stacks, canary values on the stack, etc.
So, how what methods are used now to exploit computers?
© Stack Overflow or respective owner