Part 2 of the prt-actions-pwn series. Read Part 1 for the threat landscape, attack chain, and vulnerability patterns.Continue reading on Medium »