Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

TunnelCrack: Leaking VPN Traffic by Manipulating Routing Tables

Автор: Black Hat

Загружено: 2024-03-18

Просмотров: 4130

Описание:

We will present two new attacks to leak traffic sent by a VPN client. A rogue Wi-Fi network can abuse these vulnerabilities to make the victim leak IP packets, in plaintext, outside the VPN tunnel. The adversary accomplishes this by manipulating the victim's routing table. Our attacks are independent of the VPN protocol being used, meaning they apply to IPsec, OpenVPN, WireGuard, etc....

By: Mathy Vanhoef

Full Abstract and Presentation Materials:
https://www.blackhat.com/eu-23/briefi...

TunnelCrack: Leaking VPN Traffic by Manipulating Routing Tables

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

LogoFAIL: Security Implications of Image Parsing During System Boot

LogoFAIL: Security Implications of Image Parsing During System Boot

WireGuard: Next Generation Secure Network Tunnel

WireGuard: Next Generation Secure Network Tunnel

Three New Attacks Against JSON Web Tokens

Three New Attacks Against JSON Web Tokens

DEF CON 31 - Using SIM Tunneling to Travel at Light Speed -  Adrian Dabrowski, Gabriel Gegenhuber

DEF CON 31 - Using SIM Tunneling to Travel at Light Speed - Adrian Dabrowski, Gabriel Gegenhuber

Breaking LLM Applications – Advances in Prompt Injection Exploitation

Breaking LLM Applications – Advances in Prompt Injection Exploitation

Something Rotten in the State of Data Centers

Something Rotten in the State of Data Centers

Practical LLM Security: Takeaways From a Year in the Trenches

Practical LLM Security: Takeaways From a Year in the Trenches

Master MikroTik Policy Routing - Rules or Marks?

Master MikroTik Policy Routing - Rules or Marks?

A Decade After Stuxnet: How Siemens S7 is Still an Attacker's Heaven

A Decade After Stuxnet: How Siemens S7 is Still an Attacker's Heaven

Jailbreaking an Electric Vehicle in 2023 or What It Means to Hotwire Tesla's x86-Based Seat Heater

Jailbreaking an Electric Vehicle in 2023 or What It Means to Hotwire Tesla's x86-Based Seat Heater

ОБЫЧНЫЙ VPN УМЕР: Чем обходить блокировки в 2026

ОБЫЧНЫЙ VPN УМЕР: Чем обходить блокировки в 2026

The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders

The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders

SnailLoad: Anyone on the Internet Can Learn What You're Doing

SnailLoad: Anyone on the Internet Can Learn What You're Doing

38C3 - From Pegasus to Predator - The evolution of Commercial Spyware on iOS

38C3 - From Pegasus to Predator - The evolution of Commercial Spyware on iOS

Compromising LLMs: The Advent of AI Malware

Compromising LLMs: The Advent of AI Malware

IPsec Between Two Cisco Edge Routers | Site-to-Site IPsec VPN Configurations #ipsec

IPsec Between Two Cisco Edge Routers | Site-to-Site IPsec VPN Configurations #ipsec

Off The Record - Weaponizing DHCP DNS Dynamic Updates

Off The Record - Weaponizing DHCP DNS Dynamic Updates

The Dark Side of EDR: Repurpose EDR as an Offensive Tool

The Dark Side of EDR: Repurpose EDR as an Offensive Tool

Vulnerabilities in the eSIM download protocol

Vulnerabilities in the eSIM download protocol

Не используй DNS провайдера! Защищённые DOT, DOH DNS + VPN + Keenetic

Не используй DNS провайдера! Защищённые DOT, DOH DNS + VPN + Keenetic

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com