Why “and beyond”?: stepping stone
attacks (pt 2)
ç
Most of what we need to probe the LAN
already on device. i.e.:
¼
Axis camera with shell scripting (mish) and PHP
support
¼
Routers with port-forwarding functionalities