I know the victim's public ip of his router, and also the victim runs a program that is vuln to a remote buffer overflow.
How does an attacker attack this victim computer with just an exploit that needs IP and port?
For example:
- public ip of the router: 1.1.1.1
- vulnerable program is listening to port 5511
- local ip of victim: 192.168.1.9
- attacker IP: 2.2.2.2 (connected directly to the internet or behind a router)
Tested locally, the exploit works fine because we are in the same network. The problem is when the victim is outside the network and behind a router.