You are viewing a single comment's thread from:RE: Learn Ethical Hacking Episode #50: Post Authentication Exploitation DNS (Part 1)View the full contextView the direct parentjo3potato (62)in #technology • 7 years ago Thanks! I will keep that in mind :)