When an attacker spot an open port and a vulnerability how does he hack into the system and the application layer?

When an attacker spot an open port and a vulnerability how does he hack into the system and the application layer?
Like,

If he spotted a vulnerable software or system on your computer or whatever how does he manage to get an… Continue reading When an attacker spot an open port and a vulnerability how does he hack into the system and the application layer?

I started to learn about MITM attacks, and I can’t figure out few things

I just started to learn about MITM attacks, and I can’t figure out few things.
I have few questions and appreciate all the answers.

If the attacker is already in my LAN why does he need to trp to arp spoof or dhcp spoof, ca… Continue reading I started to learn about MITM attacks, and I can’t figure out few things

My Unity game file behaviour is a little bit suspcious it deletes file. is that a place for concern?

This is the behavior of my file in virustotal should I be concerned? Or is my unity game is good to go? Cause I used some scripts i found online. Im using photon so maybe the port 53 is normal but what does the DLL being used… Continue reading My Unity game file behaviour is a little bit suspcious it deletes file. is that a place for concern?