Provided by: SecurityTube.net
The users' precious 0-day? That meticulously crafted exploit? The perfect foothold? At some point, they'll be captured, dissected and put on display. Reverse engineers when they begin snooping through their hard work, it pays to have planned out their defense ahead of time.