A few days ago i created a malicious unsuspecting PDF using OTW's how-to. I created it using Metasploit. I have a few questions about the exploit and accessing it. 1.How can now that the victim opened it? 2.After he opened it How do i access his system? 3.If i create a pers ...more
Natadad's Popular Posts
My local library has decent WiFi but unfortunately it doesn't allow you to visit every webpage including youtube ,Facebook etc.I was wondering is there I way I can allow full access fromy android phone or laptop?