Project Mentor
A weekly challenge to help you learn infosec
Pages
Home
What is this?
How can I keep up?
Wednesday, May 7, 2014
2014-05-05 Challenge: Bad Characters
During exploit development there is the concept of "bad characters". What are they? What are some common "bad characters" when trying to exploit 1) HTTP 2) FTP 3) Programs written in C
Newer Post
Older Post
Home