Blog | G5 Cyber Security

Researchers use ‘fingerprints’ to track Windows exploit developers

Check Point security researchers have developed a new “fingerprinting”” technique to find the developer of a Windows exploit. The method involves looking for uncommon source code identifiers that can be associated with a specific exploit writer such as unique artifacts (such as strings

Source: code snippets

Exit mobile version