Part II

We are given SSH access to an attack host that is connected to the domain.

Last updated

Was this helpful?