Use port scanning and other techniques to find target machines in the network
Find open shares on target machines and abuse them
Last updated 2 years ago