0days: How hacking really works (37 pages)
Exploits require large amounts of investment
Scanning/fingerprinting is non-trivial
QA on a complex piece of software is
How long is this vulnerability going to be valid?
Turn “windows of vulnerability” upside down
Multiple independent discoveries are more
the rule than the exception