Intro
I recently got a message reminding me that while reverse engineering binaries
is somewhat an easy task, as anyone can spend time scrolling in IDA Pro and get
used to how binaries are laid out, exploiting vulnerabilities is another
serious problem, and it's where the actual hacking gets done …
read more