To date, I'm only aware of a handful of exploit vectors that exist and are reliable means of penetrating system security
Trojans
Phishing
Backdoors
Auto-Updates
Wireless Key Decryption
ARP Poisoning on LAN network
I've heard SQL injection explained, but I've never seen it work in practice. (most website templates do not allow you to enter escape characters in their text fields)
Does anybody have any more info?
>>60733974
really?
see, this is what makes black hats so bad at their job, they aren't willing to share secrets.
All this shit is frankly ancient, its basically just social engineering with the rare crypto hack here or there.
>>60733974
You might be saying, "I still DO want to fuck over Walmart, its just that I've got so much to lose.."
Well, I don't have anything to lose. And I don't give a shit if it ruins my reputation or not. But I'm not going to piss my life away on something that may or may not work. Its got to have at least a fighting chance to succeed.
Nobody cares about your payload. Almost anybody can make a payload. What I care about is penetrating system security.