tag:blogger.com,1999:blog-8135211063584500909.post7343430224895141047..comments2023-10-02T15:18:02.659+05:30Comments on Lab of a Penetration Tester: Week of Evading Microsoft ATA - Day 5 - Attacking ATA, Closing thoughts and Microsoft's responseNikhil SamratAshok Mittalhttp://www.blogger.com/profile/02092541175521734123noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-8135211063584500909.post-92211482244104253942017-09-14T19:33:10.306+05:302017-09-14T19:33:10.306+05:30Good. I also recommend you to follow this referenc...Good. I also recommend you to <a href="https://spying.ninja/how-to-spy-on-a-cell-phone-without-installing-software/" rel="nofollow">follow this reference</a> on how to spy on cell phone without installing software.reginald suricthttps://www.blogger.com/profile/02865395258495641241noreply@blogger.comtag:blogger.com,1999:blog-8135211063584500909.post-25905222611794950162017-09-03T18:41:08.339+05:302017-09-03T18:41:08.339+05:30Well presented article on demonstration of the ATA...Well presented article on demonstration of the ATA identification and the approach to identifying the back end and evading the same!!!Anonymoushttps://www.blogger.com/profile/09060846975411009408noreply@blogger.com