
Attacking Network Protocols: A Hacker’s Guide to Capture, Analysis, and Exploitation James Forshaw
By
Guest gigiRoman, in Reverse engineering & exploit development
By
Guest gigiRoman, in Reverse engineering & exploit development