How do exploits even happen?

Newbie here, I'm just asking how the fuck exploits even happen, internet requests in most formats are just bytes to be read as data formats, JSON, Bytes for a file, just text; How the hell are exploits still ran into? It seems most of them like SQL Injection are only things due to old software, But hasnt the software been updated since then? How are these mistakes still ran into?

Any explanation would be helpful.

submitted by /u/Oracuda
[link] [comments]

from hacking: security in practice https://ift.tt/3iLj6sc

Comments