How They Work
Victim
Daemon
Daemon
Daemon
Daemon
Daemon
Master
Real Attacker
Previous slide
Next slide
Back to first slide
View graphic version