Skip to main content

NAT Slipstreaming: Visiting Malicious Site Can Expose Local Network Services to Remote Attacks


Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54

By Ionut Arghire on November 03, 2020

 

A newly identified attack method can bypass Network Address Translation (NAT) and firewalls, allowing the attacker to remotely access TCP/UDP services on the victim’s internal network, security researcher Samy Kamkar explains.

Dubbed NAT Slipstreaming, the attack can be triggered when the victim visits a specially crafted website, exploiting the browser and Application Level Gateway (ALG), a connection tracking mechanism present in firewalls, NATs, and routers.

 

Full Article.

0 replies

Be the first to reply!

Reply