Summary
You have now reached the end of the chapter and the book. I'm sure you'll have enjoyed reading it as much as I enjoyed writing it. In this chapter, we concluded the book by looking at the countermeasures deployed within operating systems to counteract the workings of shellcode. However, as you have seen, these can be bypassed. In this chapter, we have looked at countermeasures in both Windows and Linux. Of course, as advancements are made in the future, these countermeasures should evolve. It would be good to keep up with the advancements in addition to the bypasses that are published by security researchers. Security conferences such as Black Hat, BSides, and Defcon, would be a good place to start.