Frontpage
Back
Navigation
Figure 4
«
Previous
|
Improved defense through pen testing
|
Next image
»
Figure 4: Results of Shodan/Metasploit search.