Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Many CTF challenges use existing real vulnerabilities, so that alone may not be sufficient.


Yes, which is why you can look at the article to figure out if it is real or not.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: