How can defense know that exploit didn't change data or create oppty for other attackers to change data? @csoghoian @dguido
-
-
2nd is that exploit gains control of execution, payload executes new instructions. payload available to review
-
3rd that the NIT is memory-resident callback-type payload. There are no new introduced weaknesses, period.
- 1 more reply
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.