what you do in a tcp outfoing connect in a mallicious endpoint, this endpoint has access inside the tcp connected port and how you protect the switch layer that has no restrictions by esxii, this switch is in a ssh telnet or curl modifiable, by reeadressing these devices the software defense against this connect will not been seen, as ex, an isp uses mac briging, by mac spoof on the tcp connect your link can be connected in an recursive callback attack over the backplane ? any idea to cover this as i did this as testlab
@SultanAamh4 жыл бұрын
Bast 💙 of the bast ✨ I wish to be with you 🥰 for the world 🙏🏼 for the future 👍 keep going 😃 excellent work ❤️
@09baher6 жыл бұрын
Interesting to see ESXi 6.8 running on ARM processor