Manipulating network traffic using iptables
Manipulating network traffic is sometimes required when setting up infrastructure in a controlled environment. In fact, it is a double-edged sword that can be used for securing or penetrating a system. One example would be Kubernetes networking uses…