Más info
4
recomendaciones
Guardar en Colección
Comprar
Comentarios
Imagine you could walk up to a computer, plug in a seemingly innocent USB drive, and have it install a backdoor, exfiltrate documents, steal passwords or any number of pentest tasks.