How can defense know that exploit didn't change data or create oppty for other attackers to change data? @csoghoian @dguido
-
-
1st important point is they're proving website access which is separate from device data, eg. you are user 'x'
1 reply 1 retweet 0 likes -
2nd is that exploit gains control of execution, payload executes new instructions. payload available to review
1 reply 1 retweet 0 likes
3rd that the NIT is memory-resident callback-type payload. There are no new introduced weaknesses, period.
1 reply
1 retweet
1 like
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.