It's interesting to watch the evolution of vulnerability research and exploit development. In the beginning we used to see vulnerabilities in basic network protocols implementations, like ICMP, IP, TCP. It was the time of TCP Spoofing, Fragmentation attacks, Ping of Death.
Threat evolution
Threat evolution
Threat evolution
It's interesting to watch the evolution of vulnerability research and exploit development. In the beginning we used to see vulnerabilities in basic network protocols implementations, like ICMP, IP, TCP. It was the time of TCP Spoofing, Fragmentation attacks, Ping of Death.