🔐Realistic portrayal of hacking industrial control systems
🚔Importance of offline prison networks for security
⏲️Persistence required in the face of failed attacks
🔍Detection risk when using known exploits
💻Alternative methods like reverse shells for network access