Jan. 27, 2024, 9:01 p.m. | /u/Lolitsgab

cybersecurity www.reddit.com

Hello! Been looking for some white papers to read about how some of the exploits for consoles or mobile devices were found and executed. Always find it interesting to read these write ups. Specifically, the step-by-step TECHNICAL steps that lead to the exploit. Like, what buffer/techniques were used (ROP, Ret2LibC, etc) and how, in a technical aspect, root level access was achieved. Not looking for a guide on "download these files, put it on a USB, run them" -- but …

buffer cybersecurity devices etc exploit exploits find found hello ios mobile mobile devices papers ps4 rop technical techniques ups white paper white papers work

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Senior InfoSec Manager - Risk and Compliance

@ Federal Reserve System | Remote - Virginia

Security Analyst

@ Fortra | Mexico

Incident Responder

@ Babcock | Chester, GB, CH1 6ER

Vulnerability, Access & Inclusion Lead

@ Monzo | Cardiff, London or Remote (UK)

Information Security Analyst

@ Unissant | MD, USA