1 Problem Statement
Total Submissions : 0

A single terminal on network may create vulnerability for entire network. So based on ports open on all the terminals of the network, identify the terminal uploading data from the network on restricted port.

Special Note: Network mapping capabilities from any terminal on networks

Sample Data Required: No