Quote:
Originally Posted by Spyder73
[You must be logged in to view images. Log in or Register.]
We had our first breakthrough in September when a subnet archive deactivated a VIN adapter and the attacker(s) QRN become vulnerable to IQN pings.
|
So I suspect that an IQN ping involves getting iSCSI information from the host, but I don't know what a QRN is or a VIN adapter. Can you please explain this entire statement? I'm relatively knew to network engineering and I'd really like to know what this whole process is, unless it's bullshit, in which case I commend you on writing up nonsense that can fool a recent Comp Sci undergrad.