Hacker News new | past | comments | ask | show | jobs | submit login

You can do that on an identical system you have access to. Then you discover the necessary vulnerability and apply it on the target system.



Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: