Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level LPI Level 1 LPI Level 2 LPI Level 3
Contact

alternate data streams aiotestking

What file system vulnerability does the following command take advantage of?

_____ is found in all versions of NTFS and is described as the ability to fork file data into existing files without affecting their functionality, size, or display to traditional file browsing utilities like dir or Windows Explorer

Equizzing
    Privacy Policy

© 2025 Equizzing