Ok I finally got it…
However can somebody explain (PM me) how the binary is not a complete rabbit hole ?
From analyzing the binary with Strings, I see no reason why the CVE’s that you need to find, would actually work in this particular case…
Ok I finally got it…
However can somebody explain (PM me) how the binary is not a complete rabbit hole ?
From analyzing the binary with Strings, I see no reason why the CVE’s that you need to find, would actually work in this particular case…