Watch this video on YouTube
During a penetration test, you discover that an ICS system is vulnerable to buffer overflow attacks. What is the best initial action to take?