WagnerBR
05-12-2010, 21:45
I have one doubt.
If CIP detects modified packets from the BOT, using a Proxy for tunneling could help the BOT to be undetected, or this idea no makes sense?
Thanks.
If CIP detects modified packets from the BOT, using a Proxy for tunneling could help the BOT to be undetected, or this idea no makes sense?
Thanks.