I tested using Google’s Gemini as a helping hand in Linux log based threat hunting - and it is actually helpful, although not ready to take the security analyst’s job (yet).
You must log in or register to comment.
Set a password for the user to donaldtrump2024
of all possible common passwords to exist, that is what you went for? Its like you didnt even try.
https://github.com/danielmiessler/SecLists/blob/master/Passwords/2023-200_most_used_passwords.txt