1688 shaares
869 private links
869 private links
1 result
tagged
vulerability
Two attacks to make send traffic outside protected VPN tunnel.
- exploit VPN's LAN direct access mechanism by spoofing fake IP for target.com
- spoof the IP for VPN server
I reckon these methods should only affect unencrypted traffic or TLS without proper CN checks. Interestingly, this technique is used by some VPN software in China as an alternative way to selectively route traffic to VPN (to circumvent internet censorship). https://dreamacro.github.io/clash/configuration/dns.html#fake-ip