RE: Learn Ethical Hacking Episode #50: Post Authentication Exploitation DNS (Part 1)

You are viewing a single comment's thread from:

Learn Ethical Hacking Episode #50: Post Authentication Exploitation DNS (Part 1)

in technology •  7 years ago 

Awesome content that is very interesting. Have you already discussed os injection? Perhaps a tool called commix? Keep up the amazing content.

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  

Thanks! I will keep that in mind :)