In this post we will see in a practical way how we can steal the NTLM hashes of a Windows target using a malicious PDF. Continue reading

¿Me ayudas a compatirlo?