You have a backup right? Reset. Load the back config. Then your back where you need to be.
If it the look at kali Linux for penetration testing. I’ve never fucked with it, but it has password brute force apps and you can give it a dictionary, which would be your listing.
You have a backup right?
Reset. Load the back config. Then your back where you need to be.
If it the look at kali Linux for penetration testing. I’ve never fucked with it, but it has password brute force apps and you can give it a dictionary, which would be your listing.
(post is archived)