the posts in this section deal with the activities which are undertaken once a machine has been compromised - this phase is known as post exploitation
curiouser and curiouser
puzz00