[AFMUG] Selling off some overstock

2020-11-02 Thread Paul McCall
Guys, I have some Cambium 450 Gear that we are selling...new old stock been sitting here for a while) and some used. Open to certain trades also. Not appropriate to list here, but if you are interested, please email me directly. Paul Paul McCall, President Florida Broadband / PDMNet 658 Old

Re: [AFMUG] NAT Slipstreaming - or how to attack any internal host behind NAT

2020-11-02 Thread Lewis Bergman
If they actually have SIP devices, SIP is probably turned off as it breaks many features people want like BLF. This does not hold true for premise based systems. On Mon, Nov 2, 2020 at 10:04 AM Ken Hohhof wrote: > A little bit of discussion going on Mikrotik forum. One guy says exploit >

Re: [AFMUG] NAT Slipstreaming - or how to attack any internal host behind NAT

2020-11-02 Thread Ken Hohhof
A little bit of discussion going on Mikrotik forum. One guy says exploit didn't work with Mikrotik SIP ALG enabled, but I wouldn't take that to the bank, he doesn't give any details of what he tried. https://forum.mikrotik.com/viewtopic.php?f=2=168372 -Original Message- From: AF On

Re: [AFMUG] NAT Slipstreaming - or how to attack any internal host behind NAT

2020-11-02 Thread Adam Moffett
I read a little deeper just now.  I was wondering how he avoided having the browser toss errors or ask permission to run the javascript, or what not.  Apparently the javascript figures out the MTU and maximum segment size, then sends an HTTP post with data large enough to be fragmented.  The

Re: [AFMUG] NAT Slipstreaming - or how to attack any internal host behind NAT

2020-11-02 Thread Steven Kenney
Once it executes things on the host, it can reopen and repeat the process if that were the case. [ https://www.wavedirect.net/ |] [ https://www.facebook.com/ruralhighspeed ] [ https://www.instagram.com/wave.direct/ ] [ https://www.linkedin.com/company/wavedirect-telecommunication/ ] [

Re: [AFMUG] NAT Slipstreaming - or how to attack any internal host behind NAT

2020-11-02 Thread Ken Hohhof
I believe in the SIP world the advice is always turn off the SIP ALG. But on customer managed routers, the customer is never going to change it from the default, they don't even update the firmware. -Original Message- From: AF On Behalf Of Adam Moffett Sent: Monday, November 2, 2020

Re: [AFMUG] NAT Slipstreaming - or how to attack any internal host behind NAT

2020-11-02 Thread Ken Hohhof
Wouldn’t there be a short window of opportunity like 5 or 10 minutes before the TCP connection ages out in the NAT connections table? Or does this also rely on a flaw in some ALG? I worry more about UPnP which can program permanent port forwards in the router. There are even flawed

Re: [AFMUG] NAT Slipstreaming - or how to attack any internal host behind NAT

2020-11-02 Thread Adam Moffett
It seems to exploit behavior of the application layer gateway. That allows stuff like RTP and FTP which use dynamic ports to operate through NAT.  The script tricks the gateway into forwarding an arbitrary port number to the target device. Presumably you then attack a vulnerable service on the

Re: [AFMUG] NAT Slipstreaming - or how to attack any internal host behind NAT

2020-11-02 Thread Steven Kenney
I wondered when someone would exploit this. I knew the possibility existed because most firewalls and nat base their packet forwarding on the origin. If it is a new connection and it wasn't established internally it drops it. So when we establish a connection outside we open an arbitrary source