I found an open SSH connection on an IP that i scanned. What should i try to do to exploit it? Bruteforce? Vulnerability?
[link] [comments]
from hacking: security in practice https://ift.tt/JLy5mdg
I found an open SSH connection on an IP that i scanned. What should i try to do to exploit it? Bruteforce? Vulnerability?
Comments
Post a Comment