this post was submitted on 19 Oct 2024
3 points (100.0% liked)

Infosec News

113 readers
60 users here now

A community posting Cybersecurity related articles.

founded 1 week ago
MODERATORS
top 1 comments
sorted by: hot top controversial new old
[–] solrize 1 points 3 days ago

This is about some kind of firewall appliance that proxies http connections to devices on the inside. I didn't examine the attack in detail but it sounds like it's possible to modify unencrypted http cookies to enumerate device on the inside. Some kind of reflection attack? Or is the firewall creating it's own cookes that are malleable? Anyway the post is legit but most of us aren't using these.