When computers communicate to each other over the internet, they don’t send messages directly (as they are not directly connected), but the data is sent through a number of hops or intermediary hosts. (Called routers.)
Often, the complete patch from A to B has a number of internal hops and a lot of external ones.
If the internal hops/routers are visible, this is called a route leak, and attackers can use it to gain insight in the internal network to plan future attacks.
When computers communicate to each other over the internet, they don’t send messages directly (as they are not directly connected), but the data is sent through a number of hops or intermediary hosts. (Called routers.)
Often, the complete patch from A to B has a number of internal hops and a lot of external ones.
If the internal hops/routers are visible, this is called a route leak, and attackers can use it to gain insight in the internal network to plan future attacks.
Latest Answers