4. Attacking Targets


The team used the network penetration tools to try to compromise all of the target machines. While we had some success on certain targets, others proved to be more difficult to access.

results matching ""

    No results matching ""