This lesson is for subscribers
You've completed the free preview. Subscribe to unlock every lesson in every course.
Exploiting heap-based vulnerabilities including use-after-free, double-free, and heap overflow attacks.
You've completed the free preview. Subscribe to unlock every lesson in every course.