Chapter 5. Exploiting Client Software
You think you're the attacker, so you flip up the screen and issue a targeting order against some IP address. But things go horribly wrong. You become the victim, because now you have entered enemy territory. You do not know what the “target” system looks like. You have little idea how its software is constructed, but they see you. Any assumptions you or your systems make regarding an attack can be acted on. Since they know about you, they may infect you with a virus. After all, your client code eats what the server sends it!
You will almost always take downward fire when you waltz into some one else's network. They can take you out using your very own connections.
Now reverse things. Imagine it's your network ...
Get Exploiting Software How to Break Code now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.