VPN decloaking attack.
Requirements to exploit:
1. An attacker is on the same local network as a targeted user
2. An attacker is able to control/modify the DHCP lease for the targeted user
VPN decloaking attack.
Requirements to exploit:
1. An attacker is on the same local network as a targeted user
2. An attacker is able to control/modify the DHCP lease for the targeted user
No replies yet.