Reviewing Corelan Exploit Writing Part 2