All servers execute ASCII code; No matter the protocol; Algorithms are written in ASCII; Algorithms are patterns for creating patterns. ASCII codes have in Each Character "Time". Time to be interpreted by each server, by each program.
This time, it is the time it takes to open a port on any server.With the port open the user can send commands, for the server to execute an order.All protocols understood ASCII encoding. And they'll try to decode.
Decoding time is input. See the logical formula: ∑(a{%}<Δt(?+1)<b) - (a) is the User , {%} is ASCII, Δt(?+1) is more than a character with indefinite interpretation time, (b) is the server. At this time the attack begins.
Vulnerability is on any server, protocols make it submissive to the command of interpretation ASCII.
Space Time, possibility Attacks server: Δs<logic(x ⊢ y)=∑(a{%}<Δt(?+1)<b)
Por Joaquim Pedro de Morais Filho
Original, ref; https://www.twitter.com/Zicutake/status/1218989391823151104?p=v
This time, it is the time it takes to open a port on any server.With the port open the user can send commands, for the server to execute an order.All protocols understood ASCII encoding. And they'll try to decode.
Decoding time is input. See the logical formula: ∑(a{%}<Δt(?+1)<b) - (a) is the User , {%} is ASCII, Δt(?+1) is more than a character with indefinite interpretation time, (b) is the server. At this time the attack begins.
Vulnerability is on any server, protocols make it submissive to the command of interpretation ASCII.
Space Time, possibility Attacks server: Δs<logic(x ⊢ y)=∑(a{%}<Δt(?+1)<b)
Por Joaquim Pedro de Morais Filho
Original, ref; https://www.twitter.com/Zicutake/status/1218989391823151104?p=v