What Type of Attack Should I Use?

Feb 28, 2018 11:27 AM

Hello, So I'm planning to start ethical hacking by myself. For my first project this is what I want to do:

So I wanna do something to an Ubuntu server of mine. It accepts some json POST request (by one of the applications I made) so what I want to do is intercept that json object and modify it :) but I don't know where to start, I know programming, C++ and python for this project. What type of attack should I use?

Related Articles

637263493835297420.jpg

How to Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)

636455706472146367.jpg

How to Hide DDE-Based Attacks in MS Word

Comments

No Comments Exist

Be the first, drop a comment!