I understand how ethical hacking operates and the terms of it, but most of what they thought felt outdated (example: IOS root was said to use king root, which is adware).
Any advice where to go from here? I don't feel prepared for CTF and I don't have any hacking buddies.
[link] [comments]
from hacking: security in practice https://ift.tt/BTECKAS
Comments
Post a Comment