Or does no one remember that browsers have a built in protocol for video conferences (WebRTC) that can be use to exploit systems behind a firewall?
Or does no one remember that browsers have a built in protocol for video conferences (WebRTC) that can be use to exploit systems behind a firewall?