Hacker News new | past | comments | ask | show | jobs | submit login

> Step 3 — begin inference of protocol from observed behavior and test hypothesis by sending hand-crafted payloads to the server in question.

Curious about common tactics people use for avoiding the ban-hammer from the company at this stage. Surely they can tell the difference between normal operations and this kind of hand crafted probing?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: