Lecture 44 registry and backdoors in metsploit
7
02:55
Lecture 44 registry and backdoors in metsploit