| ||
We hope that we have covered enough ground to get you started developing exploits for the Tru64 architecture. Non-executable stack and 64-bit address registers definitely make things more challenging, but as we prove in this chapter, it is not at all difficult to come out with remote exploits even for non-typical architectures. We urge you not to believe such marketing slogans as secure by default or impossible to exploit . Once a pointer gets squashed, nothing is impossible or unbreakable .
| ||