Hello listener! In this episode of the podcast, I discuss about how a man-in-the-middle attack fundamentally functions. I talk about good and bad developer practices, as we look into Input handling and memory leaks, that can cause buffer overflows and injection attacks. Tune in to hear me talk...
Published 01/29/20
Hello listener! I've gone ahead and dedicated this entire episode to the art of social engineering, because I think throwing this in with any other two topics could make the duration insanely long. If this thing works out, I'll probably resort to individual episodes for each topic, and they will...
Published 01/24/20