I watched Fireship’s video about the Real World hack (hilarious btw), and was wondering how this was done? I know that the hackers took advantage of a chrome command, but what was it exactly?
[link] [comments]
from hacking: security in practice https://ift.tt/YaDBWKS
Comments
Post a Comment