Overflow attack, (sql) injection attack, and maybe something like using wireshark to see what a http request actually looks like.
I took two capture the flag classes which changed how I look at some of my day to day dev work.
Can you share links for the same ?
Overflow attack, (sql) injection attack, and maybe something like using wireshark to see what a http request actually looks like.
I took two capture the flag classes which changed how I look at some of my day to day dev work.