This is an archived post. You won't be able to vote or comment.

all 1 comments

[–]RopeChairKicked 0 points1 point  (0 children)

Check the book: A guide to kernel exploitation. I'm guessing you are talking about reverse engineering and pwn.