Newbie here, I'm just asking how the fuck exploits even happen, internet requests in most formats are just bytes to be read as data formats, JSON, Bytes for a file, just text; How the hell are exploits still ran into? It seems most of them like SQL Injection are only things due to old software, But hasnt the software been updated since then? How are these mistakes still ran into?
Any explanation would be helpful.
[link] [comments]
from hacking: security in practice https://ift.tt/3iLj6sc
Comments
Post a Comment