We are given SSH access to an attack host that is connected to the domain.
Last updated 1 year ago
Was this helpful?