sventi11
Hey i just saw a very interesting article on some rutgers students using rookit attacks to control phones. I'm curious how people make a rootkit attack or find one to use. i'd love to do an experiment of my own for my weekly podcast. Can somebody help me out?