Exploiting Software -ATTACK PATTERN — Part 1

--

--

--

Cyber Security Analyst & researcher

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Learning From School of Fishes & Organizing Chaos

2D Pathfinding in Unity

Code Smell 33 — Abbreviations

How we moved to Kubernetes

Making use of route helpers in Rails

How to setup your JossWork

Blinking Little (Blue) Pill

Code Smell 106 — Production Dependent Code

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Suresh Sundaram

Suresh Sundaram

Cyber Security Analyst & researcher

More from Medium

pentaho 8.2, mac, java, installation, blank screen, SWT

How to stop and start Amazon EC2 instances using Lambda Functions and EventBridge/ CloudWatch

Head First Java Book(1–5 Chapter)- Summarize

Java Burn Review — Why Java Burn Morning Coffee Is Trending Right Now

The ingredients in Java Burn are known for their high-quality and effective ingredients.