Working Exploits
●
What does a hacker want to know about a
given exploit?
–
Reliability
“Will this work in the wild?”
Target set
“Do I even care if it does?”