offensiveinterview
offensiveinterview copied to clipboard
dakahuna
- to explain how they would determine how much space they would have for their payload in an exploit?
- to explain their approach to determining whether an application is vulnerable or not?