That looks like the closest to realistic hacking I’ve seen, until you get to the graphical password box that starts flashing “access granted”. None of my SSH servers have ever done that.
But, credit where credit is due, at least she’s using realistic hacking tools.
That looks like the closest to realistic hacking I’ve seen, until you get to the graphical password box that starts flashing “access granted”. None of my SSH servers have ever done that.
But, credit where credit is due, at least she’s using realistic hacking tools.
I’m pretty sure we can do this with a bash script. Now I want it.