The mission is clear: infiltrate the target corporate network in order to obtain corporate data and perhaps even some intellectual property along the way. Tools on hand? Just you, a clean Internet-connected machine and 15 minutes of uninterrupted time.
With just a little knowledge, that’s plenty of time to get inside a supposedly unbreachable network—just by building your own botnet.