A weekly challenge to help you learn infosec
What is this?
How can I keep up?
Wednesday, May 7, 2014
2014-05-05 Challenge: Bad Characters
During exploit development there is the concept of "bad characters". What are they? What are some common "bad characters" when trying to exploit 1) HTTP 2) FTP 3) Programs written in C
Share to Twitter
Share to Facebook
Share to Pinterest