It seems to exploit behavior of the application layer gateway. That allows stuff like RTP and FTP which use dynamic ports to operate through NAT.  The script tricks the gateway into forwarding an arbitrary port number to the target device. Presumably you then attack a vulnerable service on the target device, or DOS him, or what have you.

He's specifically doing this with a Netgear R7000.  It's not clear to me whether it was a Netgear bug, or a bug in the kernel, or with ALG's in general.


On 11/1/2020 10:47 AM, Ken Hohhof wrote:
I didn't have time to read all the comments (or the brain cells to digest
them), but there's a discussion here:
https://news.ycombinator.com/item?id=24955891


-----Original Message-----
From: AF <[email protected]> On Behalf Of [email protected]
Sent: Sunday, November 1, 2020 9:23 AM
To: [email protected]
Subject: Re: [AFMUG] NAT Slipstreaming - or how to attack any internal host
behind NAT

The URL points to the security researcher's writeup on the attack and the
page contains a link to proof of concept source code on github.

Sent: Sunday, November 01, 2020
From: "Robert" <[email protected]>
To: [email protected]
Subject: Re: [AFMUG] NAT Slipstreaming - or how to attack any internal
host behind NAT
Was that site a source of the "evil javascript"?

On 11/1/20 5:39 AM, [email protected] wrote:
Synopsis: NAT Slipstreaming allows an attacker to remotely access any
TCP/UDP service bound to a victim machine, bypassing the victim's
NAT/firewall (arbitrary firewall pinhole control), just by the victim
visiting a website.
https://samy.pl/slipstream/



--
AF mailing list
[email protected]
http://af.afmug.com/mailman/listinfo/af_af.afmug.com


--
AF mailing list
[email protected]
http://af.afmug.com/mailman/listinfo/af_af.afmug.com

Reply via email to