Reverse Shells and Router Hacking
Details
Come learn about two zero day exploits that have been responsibly disclosed and how they can be chained together to achieve unauthenticated remote code execution.
Come learn about two zero day exploits that have been responsibly disclosed and how they can be chained together to achieve unauthenticated remote code execution.