Email address | private |
---|---|
First Active | 2014-12-15 |
Last Active | 2014-12-15 |
This paper discusses methodologies for performing blind command injection on embedded systems and restricted environments.
0ddf38fc9a6ebf83ee98eff187bf56078b44d152d0cee625cb886a34f9cce193