Imagine you gained access to someones Google and Outlook accounts. Cool, but of course not enough for an aspiring hacker that always wants more.
How would you guys use this privilege to gain access to a victims computer or maybe phone? I keep walking around with the idea that this should make things way easier, but can't come up with a plan.
Please share your thoughts with me!
Thanks in advance,