When i got into hacking and other shit you know i discovered that there are only 3 maybe 4 exploitation techniques and not other
1. heap overflow 2. stack overflow 3. buffer overflow 4. format string
and it was weird because in real world hacking no one talks about them and they barely exists in systems today got that vulnerabilities like that one i write above
does internet hide something from me? or other exploitation techniques just don't exist?
1. heap overflow 2. stack overflow 3. buffer overflow 4. format string
and it was weird because in real world hacking no one talks about them and they barely exists in systems today got that vulnerabilities like that one i write above
does internet hide something from me? or other exploitation techniques just don't exist?