Multi-stage exploit attacks for more effective malware delivery | ICT Security-Sécurité PC et Internet | Scoop.it
Most drive-by exploit kits use a minimal exploit shellcode that downloads and runs the final payload. This is akin to a two-stage ICBM (Inte...