On exploitation: the smart money is on inducing a network-based infoleak, the underdog is a relative payload via partial pointer overwrite.
And there are plenty of other worthy contenders in the field, like some sort of byte-for-byte bruteforce, or other statistical approaches.
3:08 PM - 13 Aug 2015
0 replies
0 retweets
1 like
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.