But that doesn't necessarily mean that they are process control machines...
This could easily be a workstation.
____________________________________

Which in turn scans and finds another host... which scans and finds another host... eventually finds a multi homed box... spreading through a network to sensitive areas once you have entry is very possible.

say for argument sake it was also a laptop...

-KF

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to