VPN decloaking attack.

Requirements to exploit:

1. An attacker is on the same local network as a targeted user

2. An attacker is able to control/modify the DHCP lease for the targeted user

https://github.com/leviathansecurity/TunnelVision

Reply to this note

Please Login to reply.

Discussion

No replies yet.