http://ysshlyesehcnscptskrpai4iupxccuvfcpbxk37kclbs3rsaqmolzaid.onion/kamikazebox.html
Instead of breaching their cyber-security, you breach their often less defended physical security. This machine can then be used 1) as a first foothold, from which you can further attack their network, or 2) to connect out from their network. Many companies are like eggs, with a hard shell, that protects them from the outside world.