Hello Team, I need to simulate and test data exfiltration through the SSH and P2P protocol.
But I didn't find a valid alternative for a PoC with a Customer.
Can I use advanced scenarios?
Any ideas that might help me?
Best answer by rubenj
View original