You must log in or register to comment.
I was expecting some exploit of the ancient underlying OS but that looked relatively simple.
The fact the exploit was able to infect config backups to persist is interesting too.
I was expecting some exploit of the ancient underlying OS but that looked relatively simple.
The fact the exploit was able to infect config backups to persist is interesting too.