Questions tagged [nat]

Network Address Translation, or NAT, is a method of remapping an IP address from one IP space to another (for example the internet to your local 192.168.x address) by modifying the IP address information in the IP datagram while they're in transit.

Network Address Translation, or NAT, is a method of remapping an IP address from one IP space to another (for example the internet to your local 192.168.x address) by modifying the IP address information in the IP datagram while they're in transit.

Related reading

73 questions
68
votes
7 answers

With IPv6 do we need to use NAT any more?

I'm wondering how to use NAT with IPv6. Seems that you don't even need it any more. So what exactly is the concept behind firewall configurations in IPv6 environments?
JaafarMehrez
  • 799
  • 1
  • 6
  • 5
32
votes
4 answers

How can my IP camera be hacked behind a NAT?

I keep reading about hackers accessing laptop and home security camera systems. Most home users are using SOHO routers meaning they are on a private IP range behind a NAT. I realize NATs aren't designed for security, but if an IP camera is behind…
Brack
  • 455
  • 1
  • 4
  • 6
10
votes
3 answers

How to directly connect to devices behind NAT from the internet?

We have an IP address on the global internet: "A" We only have access to "A". We have a network behind a router that does NAT: 192.168.1.0/24 There is a client behind that NAT: "B" We don't have access to "B" and the "NAT" router. Goal: reach the…
Marina Ala
  • 491
  • 2
  • 4
  • 8
10
votes
1 answer

Meterpreter (Metasploit) anonymous reverse connection over Tor2web

The general consensus seems to be that one sets up a listener on a server accessible by a public IP and some port forwarding. For anonymity this should be a throw-away server or a hacked box. I've been trying to make a reverse connection over tor…
Polarsbear
  • 111
  • 1
  • 7
8
votes
4 answers

How do CC servers communicate to botnet bots in a local network?

A more general question How do bots communicate in the Zeus botnet? doesn't really address my question. I'm trying to understand how a bot can communicate with command and control (CC) machine. On a technical level, I know bots use sockets (for…
kafson
  • 170
  • 1
  • 7
8
votes
1 answer

Vulnerabilities of pure NAT without firewall

Following some of the comments on this question, I was curious about the security vulnerabilities of NAT. There are similar threads here and here but they discuss router vulnerabilities rather than NAT vulnerabilities directly. So imagine I have a…
Michael B
  • 436
  • 4
  • 13
6
votes
2 answers

How to detect Network Address Translation (NAT)?

How can I detect if NAT is used in network or not? I know if you have a private address and you are able to connect to a public network or the Internet, then there must be NAT. But how can I detect that NAT is used in an internal network (which is…
Johan Gelp
  • 577
  • 3
  • 7
  • 10
6
votes
2 answers

IoT devices with public IP?

My understanding of worms like Mirai is the following: Try to telnet/ssh into random IPs using default user/pass credentials from various router/IoT manufacturers If you get in, do Bad Things™. It seems the targets are generally home/consumer…
5
votes
2 answers

How can I obtain the internal IP of a computer behind NAT but reachable via certain TCP port?

I want to obtain internal IP of a remote computer behind a NAT that I can reach by using some port, say myhost.farfar.away port 11122TCP: C:\>telnet myhost.farfar.away 11122 SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2 As you see, there is a SSH server…
5
votes
2 answers

What happens when a spoofed source IP packet is dispatched out of a private network with NATing

Suppose as an attacker i want to carry out a Ping or SYN Flood attack.. I can change the source IP of the packets generated at my machine to a false/spoofed public IP address so that replies go to that spoofed IP to avoid detection. A WiFi router or…
riteshtch
  • 151
  • 1
  • 5
5
votes
1 answer

Can ISP distinguish/identify devices behind NAT?

Let's say I have a PC and a smartphone, both connected to my home router. Scenario #1. The PC and the smartphone have VPN client installed on each device. Both devices connect to the same VPN server using the same VPN protocol. The router itself is…
ispnat
  • 51
  • 1
4
votes
2 answers

how can an attacker access a system through a compromised router?

Let's say an attacker gained access to the admin panel of a home router with port 21, 23 and 80 open. I mean the attacker has full control over the router, thus being able to port forward, etc... How could he gain access to the machines connected to…
mumei
  • 59
  • 3
4
votes
3 answers

Is a DoS attack possible on a single home connection when the ISP uses NAT?

Today almost all ISPs use a NAT system to assign more people the same IP (at least where I am), probably because the IPv4 addresses are ending and they want to save money. Is it possible to make a DoS / DDoS attack on such a connection? Knowing the…
3
votes
1 answer

Can NATs and firewalls blacklist IPs when trying to UDP hole punch?

I am developing a P2P application that will make use of UDP hole punch to connect two peers behind NAT. When dealing with connections between a cone and a symmetric, unpredictable NATs, however, hole punching is not as trivial as it could be with…
Matteo Monti
  • 141
  • 2
3
votes
0 answers

Can NAT Table be vulnerable toward any poisoning attacks?

I am learning the general concept of network security, and becomes aware of two poisoning attacks on the network infrastructures, that is, DNS poisoning attacks and ARP poisoning attacks. They are both due to certain cache structures. It seems to…
1
2 3 4 5