Changes

63 bytes added ,  09:33, 25 September 2015
Line 43: Line 43:     
==Secondary Exploits==
 
==Secondary Exploits==
Installation of these exploits requires a previously exploited system.
+
Installation of these exploits requires a previously exploited system to install. After installation, they can be used on their own.
 +
 
 
{| class="wikitable" border="1"
 
{| class="wikitable" border="1"
 
!  Name
 
!  Name