AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
How to Hack Network Protocols
You wrote a book called Attacking Network Protocols. You talked about how there were some tools that existed, but you know, it sounds like they didn't meet your needs. And then the title of your talk of Blue Hat 2023 was why I write my own security tooling and you should too. When should a researcher, when should anyone consider writing their own tools? Well, it depends. There are amazing tools out there you are contributing through the tooling that you write and release. But yeah, certainly one of the key times to write your own tooling is if you don't fully understand a particular technology.