So I remember with an addict's clarity the first time I used an exploit to break into a system. I think we all do. And I remember equally well the first time I hacked into a system with an exploit that I myself found and wrote specifically for that purpose.
I'm not a great exploit writer by modern standards. But I know a few people who are, and they're going to be teaching both Web Hacking (where you can learn Padding Oracle attacks), and client-side+kernel exploitation in Columbia, MD in late July. Ping me if you are interested in the class. -dave
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Dailydave mailing list [email protected] https://lists.immunityinc.com/mailman/listinfo/dailydave
