Can you use these as a way to gain access to a computer? if so how would you go at that?
Jesse Brown's Latest Posts
Kali Linux 2.0 Okay so I have been practicing using metasploit. I have created a back-door file, I have put it on my lab laptop, and I have setup persistence and done some stuff to get used to most things. I somewhat understand most of what I need/want to for right now. I ha ...more