Introduction - If you have any usage issues, please Google them yourself
Many times by friends invited to write an article on the under Win32 Exploit article. One reason these articles are more on* nix platforms, but Win32 relatively small Second, because the exploit in Win32 in some areas may be difficult to write a little. I will use the following simple example of a specific, detailed analysis of the vulnerabilities found in mining, debugging, and exploit the preparation of use, here select the ' War-FTPd vl.65' of a stack buffer overflow vulnerability.