We're usually invested in learning how to get into a server, but... then what?
Of course if you'd have multiple pwns you'd be able to build up a decent botnet, but what about only one? Is it possible to capitalize on it and what would be more profitable?
General question to understand which types of threat analysis should be invested to try to identify traffic types.
[link] [comments]
from hacking: security in practice https://ift.tt/DPXlbKS
Comments
Post a Comment