Skip to content
Better HN
Top
New
Best
Ask
Show
Jobs
Search
⌘K
0 points
bartbes
11y ago
0 comments
Share
I think the intent here is to decrypt and then reverse engineer the network traffic, so they can then check for vulnerabilities server-side. So they aren't auditing the application, they're just trying to find a way in.
undefined | Better HN
0 comments
default
newest
oldest
wglb
11y ago
(You are plying to the author of the article, possibly intending to reply to the parent.)
This is part of auditing an application. Finding a way in is only one step of the process.
j
/
k
navigate · click thread line to collapse