7. Conclusion


Overall, we used many network penetration tools to scan, probe, and exploit various targets and groups. The team managed to compromise many targets and gain a better understanding on how to protect devices from network based attacks.

results matching ""

    No results matching ""