How Hackers Actually Find Vulnerabilities: Reconnaissance & Scanning
In Part 1, I followed a packet from my browser to a server.In Part 2, I understood where networks become vulnerable.
Everything started making sense.
But one question kept bothering me:
How do attacke
thinksecure.hashnode.dev6 min read