BINARY EXPLOITATION

Goal: Identify flaws for exploitation research.

This phase is typically for modifying behavior once the code is understood. These could include patching, shellcode injection, bypassing checks (anti-debugging), etc.

Last updated