| ▲ | rolph 4 hours ago | |
"blindly trust some HTTP headers" "Without controling a router" "Requires mutually agreed spoofing on both sides" you understand the concepts, and the requirements for POC, but you are not the only one. and for those who want a working weapon,they will have to identify ALL the requirements and implement it themselves. im not about to leave the weapon loaded and fully assembled in a public place. it sounds like you are fully capable of manufacturing that weapon if you really wanted to. also people really are soft, it starts with soc eng, and goes from there. | ||