When we first start using a device, there are many things we want or need access to. That may include media such as games, music, or even software we use to create our programs. To get these media, we typically download them to our devices, providing us access to use them based on our needs. Unfortunately, downloading different media comes at a risk. It's our reality that cybercriminals actively exploit vulnerabilities in our systems and software to access our information. One way they exploit our systems is through downloads.
As discussed in Part 2, input validation ensures that our programs utilize clean and secure data. When downloaded files lack proper validation, it opens an opportunity for hackers to gain unauthorized access and read sensitive information from our computers.
<aside> 💡 Instructions: Click submit at the end of the form
</aside>
https://forms.gle/7GTseyobzuYXqY5UA
Whether you have been a victim of a cyber attack or not, we know this risk exists. Therefore, when writing our programs, we must ensure we think of possible vulnerabilities and put in measures to prevent them.
A command line downloader known as MangaDix, unfortunately, harbored a vulnerability related to input validation. Let's delve into the intricate details of how this specific vulnerability impacted the functionality of this downloader.
<aside> 💡 Instructions: Read the following article on MangaDix.
</aside>