Quote:
Originally Posted by Scripter
okay what you dont get is that the attack I was trying requires the victim to download a file, which when clicked and ran gives access to their files.
other ways would take much longer since I would have to scan your ports and find vulnerable software on your pc.
Just as I said before I am at home lol
|
Where do you normally do it then?
The library?