Wednesday, May 7, 2014

2014-05-05 Challenge: Bad Characters

During exploit development there is the concept of "bad characters". What are they? What are some common "bad characters" when trying to exploit 1) HTTP 2) FTP 3) Programs written in C