How Telephone Phreaking Worked
yewtu.be
external-link
Support The 8-Bit Guy on Patreon: https://www.patreon.com/8BitGuy1 Visit my website: http://www.the8bitguy.com/

Something I found really interesting was that a lot of the techniques resembled modern code injection, where user input was being mistakenly interpreted as a control signal from the system itself, kind of like forgetting to escape your SQL statements.

Confidentiality Integrity Availability

  • 0 users online
  • 3 users / day
  • 5 users / week
  • 17 users / month
  • 63 users / 6 months
  • 2.44K subscribers
  • 510 Posts
  • 492 Comments
  • Modlog