摘要: Application Exploits, Part I APPLICATION-BASED EXPLOITS Injection attack Inserting additional data into application beyond what is expected SQL (Struc 阅读全文
posted @ 2020-09-19 21:52 晨风_Eric 阅读(72) 评论(0) 推荐(0) 编辑
摘要: Wireless Exploits WIRELESS AND RF VULNERABILITIES Wireless and RF vulnerabilities Broadcast is wide open aircrack-ng Evil twin - rogue WAP used to eav 阅读全文
posted @ 2020-09-19 11:30 晨风_Eric 阅读(73) 评论(0) 推荐(0) 编辑