Hi everyone,
Sometimes at work I have to prove that a risk is actually vulnerable (don't ask me why I don't have proper training if it's for work, because the massive budget cut...). So, I have been searching on internet, and the result has not been so great, plus I'm not sure if I should try everything pops out. My question is, could someone point me to a correction and safe direction to learn exploitations? Thanks.
YanYan
Sometimes at work I have to prove that a risk is actually vulnerable (don't ask me why I don't have proper training if it's for work, because the massive budget cut...). So, I have been searching on internet, and the result has not been so great, plus I'm not sure if I should try everything pops out. My question is, could someone point me to a correction and safe direction to learn exploitations? Thanks.
YanYan