Im somewhat new to the hacking ecosystem, however a am a fairly decent programmer, and i was wondering if anyone knew, in-depth, how basic remote access trojans work, some of the basic networking and code being them ect. I would like to learn a bit about them, and would like to write my own. I realize that it is highly complex, and it likely wont work, but would still like to learn, thanks to anyone who can help
[link] [comments]
from hacking: security in practice https://ift.tt/c8HDLO3
Comments
Post a Comment