Questions tagged [nat]

Network Address Translation, or NAT, is a method of remapping an IP address from one IP space to another (for example the internet to your local 192.168.x address) by modifying the IP address information in the IP datagram while they're in transit.

Network Address Translation, or NAT, is a method of remapping an IP address from one IP space to another (for example the internet to your local 192.168.x address) by modifying the IP address information in the IP datagram while they're in transit.

Related reading

73 questions
2
votes
2 answers

Is DHCP spoofing ever possible on VMware?

So I've just watched this Defcon video:https://www.youtube.com/watch?v=RaA5dEIqzzQ&t=1583s. Apparently they were able to set up a rouge DHCP server and get a 50/50 chance of sending the victim the DHCP offer before the legitimate DHCP server.…
Lew Wei Hao
  • 429
  • 5
  • 13
2
votes
1 answer

Client security using UDP

Introduction I am currently trying to build up a networking layer for Unity from scratch. Currently I am testing the communication via UDP using Node.js for the server and the client. However I guess the language of the implementation will not…
Bee
  • 121
  • 3
2
votes
2 answers

How can a website block IPs behind a NAT?

Will a website be able to block my IP address alone somehow, while I am running a security tool behind my NAT? Or will it block my ISPs gateway IP?
No_Name__
  • 23
  • 6
2
votes
1 answer

NAT Mac address leak to Internet

Recently in the leaked 0-day exploit for Tor browser, whole shellcode's purpose was getting user's MAC address and sending it to the servers which people are suspecting that exploit was developed by Law enforcement to unmask some TOR users real…
John McKean
  • 73
  • 1
  • 6
2
votes
1 answer

Multiple users sharing the same IP

I'm setting up a quite unusual proxy for a very specific niche case. I'm allocating (ip,port) addresses to users, from which they can send and receive UDP and TCP packets. e.g. say someone is allocated 1.2.3.4:50000, they can then send packets from…
Max
  • 121
  • 2
1
vote
2 answers

How does malware performs a UDP hole punch?

I want to know how do malware like ZeroAccess hole punch the network without using a external server? Or do they just mainly infect non-NAT users? Does that mean all NAT users are safe?
user47352
1
vote
1 answer

Should reverse connections be used to bypass NATs?

I'm planning on doing a demonstration on how remote administrative tools work for my schools computer security club. I plan on writing a RAT in C++ and demonstrating/explaining how it works. I ran into the issue of dealing with computers behind a…
1
vote
1 answer

Is opening all ports on a router safe if it is simply redirection to a VPN server at 192.168.1.2:51820?

The motive for doing this is that I want to open other ports so that I can evade firewalls which block VPN connections. Instead of redirecting eg. port 53 or 123, I could simply set up a destination NAT rule (my router allows 'easy' port forwarding…
1
vote
0 answers

How to Prevent Attacker from Abusing IPv4-embedded IPv6 to Bypass Security Mechanism?

Section 5.3 of RFC6052 explained how an attacker could abuse the NAT64 translation mechanism to bypass security mechanism such as firewall or IDS/IPS if those devices only have an IPv4 blacklist. The mitigation is to convert the IPv4-embedded IPv6…
1
vote
2 answers

Can the Police trace an internal user which is behind a shared IP?

Can the Police or any other lawful body obtain information about a criminal from the ISP knowing such things as the shared IP (the NAT, I believe?), timestamps, visited websites etc.?
1
vote
1 answer

Security implications of using public subnets in AWS VPC for hosting web and job servers

I have been using AWS for hosting personal projects, mostly in the form of containerized Django web apps running on ECS with Fargate. I have referenced this article to better understand Fargate task networking:…
briancaffey
  • 143
  • 1
  • 5
1
vote
3 answers

Can a magical packet traverse thru a NAT?

In the case of "normal" tightened security where no DMZ, Port Forwarding is setup is it possible with any of the available NAT traversal methods for a magic packet to traverse thru a NAT from the outside network (Internet) and wake up a PC? The…
Sir Muffington
  • 1,447
  • 2
  • 9
  • 22
1
vote
0 answers

Is public and local IP addresses of computer behind NAT a sensitive information?

So I'm playing with WebRTC and I've found that you can get public IP and local IP of other computer. Here is my code that show IP https://codepen.io/jcubic/pen/yvMeRg?editors=1010 (the code is used to transfer the files between computers but it also…
jcubic
  • 209
  • 2
  • 11
1
vote
1 answer

ASA VTI NAT policy options

I am using a virtual tunnel interface to connect my ASA to a router in order to use BGP between the two. The inside network on the ASA (10.10.10.0/24) needs to use source NAT to make it appear to the router that 10.10.10.0/24 traffic it is in fact…
Daveba123
  • 43
  • 5
1
vote
3 answers

How to detect a DoS attack if today all use network address translation?

If a basic DoS attack can be handled by limiting the number of connections that occur in a interval of time with one IP and some enterprises and institutions use network address translation with many people using internet services. How do you can…
BlueSeph
  • 113
  • 4