Which in turn scans and finds another host... which scans and finds another host... eventually finds a multi homed box... spreading through a network to sensitive areas once you have entry is very possible.
But that doesn't necessarily mean that they are process control machines... This could easily be a workstation. ____________________________________
say for argument sake it was also a laptop...
-KF
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
