Questions tagged [nat]

Network Address Translation, or NAT, is a method of remapping an IP address from one IP space to another (for example the internet to your local 192.168.x address) by modifying the IP address information in the IP datagram while they're in transit.

Network Address Translation, or NAT, is a method of remapping an IP address from one IP space to another (for example the internet to your local 192.168.x address) by modifying the IP address information in the IP datagram while they're in transit.

Related reading

73 questions
0
votes
0 answers

Methods for device enumeration behind NAT and its prevention

What methods do exist for enumeration devices behind a NAT from the upstream connection? I found sflow which uses TTL values. Are there other ways? I think this is partially related to OS fingerprinting. But from OS fingerprinting alone you would…
0
votes
1 answer

Windows Firewall allows the connection to more than one user who shares the same external IP address

I wrote a stand-alone anticheat. When the client anticheat connects to its server, the server creates a firewall rule allowing the game client to gain access to the server. The problem is the firewall creates rules by IP address. If NAT is used,…
0
votes
2 answers

How to ban IP address behind NAT

I am creating WebSocket server with rust and tokio and I want to prevent DDos attacks and spams. So I thought of creating HashMap and inserting IP address for 1 hour which i suspect is trying to do spamming or DDos Attack but will this also ban…
voldimot
  • 101
  • 5
0
votes
1 answer

Direct access to clients behind NAT

We have a client/server application which we set a port for both server and client to listen to and then enter a list of clients as IP (Host)/Port pair in the server's admin panel for monitoring clients. Then the server connects to clients and asks…
0
votes
1 answer

How to attack a specific computer behind a NAT using remote buffer overflow

I know the victim's public ip of his router, and also the victim runs a program that is vuln to a remote buffer overflow. How does an attacker attack this victim computer with just an exploit that needs IP and port? For example: public ip of the…
Dzinosky
  • 11
  • 3
0
votes
0 answers

Is it possible to gather information about a destination-nat host?

Let's say that I'm connected to a network where the ISP has setup a dst-nat from an IP they don't control to an IP that they control,like so: 1- Their DNS server resolves example.xyz to 1.1.1.1 (the ISP doesn't own/control this IP) 2- The ISP hosts…
0
votes
1 answer

How to block all inbound traffic from a specific Internet address or subnet using TomatoUSB router software (LINUX based)

I'm not trained in Linux, but I think I found the solution to my problem documented, but it is not working as expected. I am NOT an iptables guru, I'm learning as I go. A Russian IP is trying to hack my network, especially an email server I have…
appDeveloper
  • 171
  • 3
0
votes
1 answer

How safe is NAT in keeping my private network private

To extend on How can a webpage scan my local, internal network from the Internet? how safe is my private network against possible threats like DoS attacks, spoofing attacks, revealing info about my private network services etc. Have there have been…
Sir Muffington
  • 1,447
  • 2
  • 9
  • 22
0
votes
1 answer

Differentiating identical requests from different computers in a local network

On the same local network, we have two identical computers (a) and (b) which have identical software installed which send identical HTTP headers and requests to the same server, except for the url which reveals which machine the request comes…
forthrin
  • 1,741
  • 1
  • 13
  • 21
0
votes
1 answer

IPv6 and NAT firewall effect

It seems that people still argue on whether to use NAT with IPv6 for its side-role as a firewall hiding inner network from the outside (providing user anonymity and security as well). I am wondering though if we could not use an actual firewall for…
sasuke_X220
  • 371
  • 3
  • 15
0
votes
1 answer

How to attack a specific computer on a remote network?

In a situation where I know the victim's public ip of their router, how does an attacker attack a specific computer in that network using something like metasploit? Because when using metasploit in the target address you either put the local ip of…
pedro santos
  • 153
  • 2
  • 12
-1
votes
1 answer

Applicability of Same Origin Policy (SOP) when IP address is remapped via NAT

When an inbound/outbound TCP/IP traffic is faced with NAT address mapping, it's perfectly possible to have a different IP address as your request origin every few minutes. This is how most of the commonplace web application receives the client's IP…
ha9u63ar
  • 151
  • 6
-5
votes
1 answer

My Tutors reasoning of how NAT provides security

I don't consider NAT a security measure at all but here is my teachers reasoning of how NAT provides security. My course has been appalling and this reasoning is just laughable to me. This is a £3000 course and this is his explanation. "If you…
Capcom
  • 1
  • 1
1 2 3 4
5