I've read tons of articles though I still can't seem to wrap my head around the specific type of method that the attacker(s) used to get in. I'm new to a bunch of these terms so I may be using them wrong, but is it safe to assume that the attacker may have used brute force?
Though, I read that the login info of one of the users was obtained, but I'm left wondering how.
Anyone have any ideas on how they may have gone about this attack?
[link] [comments]
from hacking: security in practice https://ift.tt/EB6rSj8
Comments
Post a Comment