Quote:
Originally posted by Ad3pt
If they have the ftp u/p it's not an exploit.
On the other hand, if their local workstation is owned by a trojan/keylogger that would be an exploit.
Only point Im trying to make is that having this guy jump to conclusions isn't going to give him the info he needs.
|
Yes, but the chances are greater that they got in via an exploit.