This is a dedicated watch page for a single video.
A team of cybersecurity enthusiasts was cruising around a corporate headquarters in an urban area, traveling in a high-end vehicle. They were utilizing hacking tools on their portable computer with the aim of locating an open wireless network for unauthorized access. What is this hacking process known as?