Slide 16
Slide 16 text
To exploit vulnerability attackers relies on known techniques.
Identifying those techniques and studying the structure of the
exploit may help to build a relevant hunting or detection rule.
In this presentation, we uncovered an unknown new sample
that uses the same strings convention as the original one.