https://code.google.com/p/it-sec-catalog/wiki/Exploitation и PDF http://security.cs.rpi.edu/~gaasem/winexp/IndependentStudy.pdf