Jan. 13, 2023, 10:11 a.m. | Ismail Tasdelen

InfoSec Write-ups - Medium infosecwriteups.com

Photo by Marek Studzinski on Unsplash

In this article, I will be talking about the Endianness structure and the exploit development process. Endianness refers to the order in which bytes are stored in a computer’s memory. The two main types of endianness are big-endian and little-endian.

In big-endian systems, the most significant byte (the “big end”) of a multi-byte value is stored at the lowest memory address, while in little-endian systems, the least significant byte (the “little end”) is stored …

address article big computer concept cybersecurity developers development development process end exploit exploit development main memory order photo process systems talking types value vulnerability research

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Data & Security Engineer Lead

@ LiquidX | Singapore, Central Singapore, Singapore

IT and Cyber Risk Control Lead

@ GXS Bank | Singapore - OneNorth

Consultant Senior en Gestion de Crise Cyber et Continuité d’Activité H/F

@ Hifield | Sèvres, France

Cyber Security Analyst (Weekend 1st Shift)

@ Fortress Security Risk Management | Cleveland, OH, United States

Senior Manager, Cybersecurity

@ BlueTriton Brands | Stamford, CT, US