Hello, i want to know somethings :
- Did the payload page for the exploits run a .elf or some raw C++ Code ?
- How does it launch it from a JavaScript page (HTML <script>)
And also btw, can we run or read code or elf with another way than this ? ...
- Did the payload page for the exploits run a .elf or some raw C++ Code ?
- How does it launch it from a JavaScript page (HTML <script>)
And also btw, can we run or read code or elf with another way than this ? ...