Penetration Testing with the Bash shell
上QQ阅读APP看书,第一时间看更新

Chapter 4. Exploitation and Reverse Engineering