The experiment is detailed in a new report by the Department of the Interior's Office of the Inspector General (OIG).
We used the virtual machine as-is and did not install any tools, software, or malware that would make it easier to exfiltrate data from the subject system.
[
add
]
[
|
|
...
]