@benhawkes modify ACLs to allow pass-through. Enumerate rules to find sensitive assets. GRE tunnels for mitm. Redirects. Trojaned firmware?
-
-
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@benhawkes Without requiring persistence: extract PSK/private-keys used for VPN connections, MITM/decrypt freely in the futureThanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@benhawkes "dump all of your crypto keys and password material at me right now"Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.