The Packet Punisher

The Packet Punisher

You work with The Packet Punisher, and you've detected a live exploit in progress. With a hacker embedded in your system, what is your tactical response to neutralize the threat and reclaim your domain?

The Packet Punisher
10 seconds remaining before we begin