Skip to main content

NAT Slipstreaming 2.0 Exposes Devices on Internal Networks to Remote Attacks


Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54

By Ionut Arghire on January 26, 2021

 

A newly devised variant of the NAT Slipstreaming attack can be leveraged to compromise any device on the local network, according to researchers at enterprise IoT security firm Armis.

Detailed in late October 2020, the NAT Slipstreaming attack relies on tricking the victim into accessing a specially crafted website and exploits the browser on the device, along with the Application Level Gateway (ALG), a connection tracking mechanism in Network Address Translation (NAT), firewalls, and routers.

 

Full Article.

 

0 replies

Be the first to reply!

Reply