might this include network metadata, if an adversary has network visibility but not yet host access?
-
-
-
Of course, there's an entire section dedicated to Network based detection techniques. Even by only searching for the open ports, than can tell you a lot.
@OutrageousLynx
Kraj razgovora
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.