
I'll step outside. So basically to make a bit sense here we have on the right side we have some remote code executions. On the left side, we've got some memory reads where you could read session keys from the Citrix memory and basically replay existing sessions and therefore skip things like login and MFA and all right obviously can run on authenticated code and now also we can look at the top it's like the old older uh exploit or vulnerabilities and on the bottom we have the newer versions. So you can see like C2 speed one and two it's kind of similar and also on the right side we have two rccees which are kind of similar in the sense that if you
investigate it it's basically more or less the