anantshri
Highest Rated Comments
anantshri1 karma
How often do you encounter fully connected Linux/Unix based networks when pentesting internally. (centralized authentication, group based access, central file sharing server etc)?
anantshri1 karma
How often do you encounter fully connected Linux/Unix based networks when pentesting internally. (centralized authentication, group based access, central file sharing server etc)?
anantshri50 karma
If you are asked to fill out a pareto chart style (roughly 80% of the effects come from 20% of the causes) What would be you pick of 20% say in case of networks, web and mobile?
View HistoryShare Link