In most attack scenarios, attackers have to perform a crucial operation: to load a shellcode in memory and execute it. This is often performed in a three-step process:
This article has been indexed from SANS Internet Storm Center, InfoCON: green
Read the original article: