During this paper, authors made arbitrary software and then used it to a locked target to achieve access towards the device’s interior sensors and logs with the assistance of neutralization and hardening procedures to predict the effectiveness. Figure four illustrates impression and video capture by sky grabber software within the https://www.gmdsoft.com/