DarkyAngel Posted July 2, 2012 Report Posted July 2, 2012 (edited) Cuprins :1.0 Preface2.0 Current State2.1 Detection2.2 Exploitation2.2.1 Remote File Location2.2.2 Obfuscation2.2.3 Payload3.0 The Next Step3.1 Improving Detection3.2 Improving Exploitation3.2.1 Remote File Location3.2.2 Obfuscation3.2.3 Payload4.0 ConclusionDownload :http://www.exploit-db.com/wp-content/themes/exploit/docs/19032.pdf Edited July 2, 2012 by DarkyAngel Quote