0days: How hacking really works (37 pages)

custom exploitation • custom web application hacking • custom analysis of target's environment

Document rating:
  5.0 out of 5
Vote this doc:
background image

Custom Exploitation

The most covert exploit is one that is
used only once

Custom web application hacking

Custom analysis of target's environment

Example: Exploit for cam.exe with Entercept
installed in the exact configuration you have

for all your servers

Document rating:
  5.0 out of 5
Vote this doc: