What’s really interesting is you could then look for other places this pw was used… doing a hash in that direction is fine. this technique has been used to track APT actors
2 Likes
What’s really interesting is you could then look for other places this pw was used… doing a hash in that direction is fine. this technique has been used to track APT actors