The URL points to the security researcher's writeup on the attack and the page 
contains a link to proof of concept source code on github.

> Sent: Sunday, November 01, 2020
> From: "Robert" <[email protected]>
> To: [email protected]
> Subject: Re: [AFMUG] NAT Slipstreaming - or how to attack any internal host 
> behind NAT
>
> Was that site a source of the "evil javascript"?
>
> On 11/1/20 5:39 AM, [email protected] wrote:
> > Synopsis: NAT Slipstreaming allows an attacker to remotely access any 
> > TCP/UDP service bound to a victim machine, bypassing the victim's 
> > NAT/firewall (arbitrary firewall pinhole control), just by the victim 
> > visiting a website.
> >
> > https://samy.pl/slipstream/
> >
> >
>
>
> --
> AF mailing list
> [email protected]
> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
>

-- 
AF mailing list
[email protected]
http://af.afmug.com/mailman/listinfo/af_af.afmug.com

Reply via email to