Hey, I wonder how to use DROWN attack to exploit a website. Can somebody help me with that?
saw the article on netsec too? yea I would also appreciate a "explain like I'm a script kiddie" ELIASK. If you haven't read this yet this is a good start https://drownattack.com/