How is Jim Browning connects to the scammer's computers and see what they are doing?

Here is an example of it.

Is he using some kind of a vulnerability in SupRemo?

submitted by /u/dont_mess_with_tx
[link] [comments]

from hacking: security in practice https://ift.tt/39mGl7R

Comments