A penetration tester exploited a unique flaw on a recent penetration test of a bank. After the test was completed, the tester posted information about the exploit online along with the IP addresses of the exploited machines. Which of the following documents could hold the penetration tester accountable for this action?
Davar39
Highly Voted 3 years, 3 months agoAnarckii
Most Recent 1 year, 10 months ago