13.1. Fixing Memory Corruption Exploits
based on the given exploit and the target os, we might need to modify
return addresses
ips and ports
13.2 Fixing Web Exploits
Last changeda year ago