In the article I wrote on the abysssec.com website, I explained the steps and techniques needed to build a working exploit for Ken Ward's zipper. One of the main difficulties I had to overcome when building the exploit, was the character set limitation. I basically could only use a subset of … Continue reading
I just wanted to drop a few lines to let you know that, earlier today, my exploit write-up article about this vulnerability was published on www.abysssec.com.
You can find the article here … Continue reading