Answer the question
In order to leave comments, you need to log in
How to test protocols for vulnerabilities?
There is a task - to test the data transfer protocol. How do they test protocols in general, how do they look for vulnerabilities?
There is evidence that AES-256, RSA are used for encryption
Answer the question
In order to leave comments, you need to log in
Read about fuzzing, for example: https://en.wikipedia.org/wiki/Fuzzing
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question