2. open tool exploitDB, we search file tar which will exploit
3. open your information with cat
4.open with python and type result extrak
6. and last, open language perl, no ip address , port /etc/shadow
/etc/shadow this , storage password collection
Tidak ada komentar:
Posting Komentar