Login / Signup

Exploiting a buffer overflow using metasploit framework.

Mustapha Refai
Published in: PST (2006)
Keyphrases
  • data mining
  • information systems
  • access control
  • lightweight