Interesting Technique to Launch a Shellcode, (Wed, Aug 27th)

In most attack scenarios, attackers have to perform a crucial operation: to load a shellcode in memory and execute it. This is often performed in a three-step process:

This article has been indexed from SANS Internet Storm Center, InfoCON: green

Read the original article: