Похожие чаты

I'M not hacker or anything but i always suffer when

i see that you are wasting your energy, time and resources for finding something in wrong places, anyways as long as i know, these kind of simple mistakes happens and are usable just in complex codes (to hopefuly not get fix soon) and opportunities are different and very dynamic depend on code, compilation and environment, bringing fake simple examples won't help, for example even after you could read couple of bytes outside of buffer what you can do with it if you don't know what exists there and how stuffs works in very low level details? anyways there are many writeups for real exploitations which you can find publicly available in internet, but at the end you must try to be a good programmer and try to reason about real codes before that topic, starting from bugs is not a good approach leads to nowhere after a lot headaches. try to intall gentoo or linux from scratch, customize it as hell and see from inside and read books and write and debug a lot code and play a lot with compilers and read a lot bleeding edge code, you will see many dynamic mistakes and after proper understanding, you can use bugs for crafted purposes for the code's context as much as you know about the context and applied defences and limitations. the more you learn the more details you will face with, it's an endless journey, don't assume that ctfs and labs will be key to ultimate power, these are designed just to show you a mental view. security is a huge topic you can not avoid details.
in the other hand you will enjoy programming a lot if you try to code which maybe even change your goals

1 ответов

13 просмотров

The definition of the Great Wall of Text

Похожие вопросы

Обсуждают сегодня

Господа, а что сейчас вообще с рынком труда на делфи происходит? Какова ситуация?
Rꙮman Yankꙮvsky
29
А вообще, что может смущать в самой Julia - бы сказал, что нет единого стандартного подхода по многим моментам, поэтому многое выглядит как "хаки" и произвол. Короче говоря, с...
Viktor G.
2
@Benzenoid can you tell me the easiest, and safest way to bu.y HEX now?
Živa Žena
20
This is a question from my wife who make a fortune with memes 😂😂 About the Migration and Tokens: 1. How will the old tokens be migrated to the new $LGCYX network? What is th...
🍿 °anton°
2
30500 за редактор? )
Владимир
47
а через ESC-код ?
Alexey Kulakov
29
What is the Dex situation? Agora team started with the Pnetwork for their dex which helped them both with integration. It’s completed but as you can see from the Pnetwork ann...
Ben
1
Гайс, вопрос для разносторонее развитых: читаю стрим с юарта, нада выделять с него фреймы с определенной структурой, если ли чо готовое, или долбаться с ринг буффером? нада у...
Vitaly
9
Anyone knows where there are some instructions or discort about failed bridge transactions ?
Jochem
21
@lozuk how do I get my phex copies of my ehex from a atomic wallet, to move to my rabby?
Justfrontin 👀
11
Карта сайта