Starting with a port scan. So there is a SSH server running and a webserver on port 80 and 443....
following the cyber security path…
following the cyber security path…
Starting with a port scan. So there is a SSH server running and a webserver on port 80 and 443....