Then how should i actually instrument the exploit so I can understand the different syscalls involved , binary it executes etc .
Any resources are pretty much appreciated.
Then how should i actually instrument the exploit so I can understand the different syscalls involved , binary it executes etc .
Any resources are pretty much appreciated.