
Now um as we have instance for both uh vulnerabilities or both categories of vulnerabilities we're going to group it up a little bit. So on left side we've got the remote code execution. So how do we analyze it from a forensic point of view and on the right side we've got a memory read. So basically first steps for attacker as soon as he exploits the vulnerability what are his first steps.