Questions tagged [port-forwarding]
82 questions
1
vote
1 answer
NMAP port scan on home router looks strange to me
Today I was playing around with Nmap on Ubuntu Linux. I performed a port scan on our home router with nmap -sV 192.168.1.1
The results were as follows:
**Starting Nmap 7.01 ( https://nmap.org ) at 2016-09-18 12:08 SAST
Nmap scan report for…
![](../../users/profiles/124726.webp)
giujbikj
- 11
- 1
- 4
1
vote
1 answer
Browser Autopwn2 Unable to Exploit "Victim" on Separate Network
Am using VMWare Workstation 10 Player.
Kali Linux OS is Nat
Windows XP is bridge
That means both are on separate networks. I am trying to make Kali Exploit the XP box.
Remote Windows is 192.168.1.9 and Local Kali Host is 192.168.88.129
On Kali I…
![](../../users/profiles/78479.webp)
Rhonda
- 143
- 8
1
vote
1 answer
PCI and SSH Port forwarding
I am trying to convert a widows jump server to a Linux jump server. There are a few windows boxes behind this jumpserver, and I was wondering if I can just enable port forwarding over ssh with a password based ssh key, and rdp to those servers.…
![](../../users/profiles/120912.webp)
yetdot
- 706
- 5
- 7
1
vote
1 answer
ssh tunneling /port forwarding/access different subnet
Hi I need some good pointer or any recommendation any docs about this below stated scenario.
During in my recent pentesting :
My ip is 192.168.x.1(kali)
By some how I managed to get root shell on some unix system with ip 192.168.x.21.
Now when I…
![](../../users/profiles/79963.webp)
Avik
- 31
- 1
- 5
0
votes
3 answers
Attack vector: Internet Service Provider
I'm suspicious. I wanted to forward a port (80) on my router and noticed that port forwarding didn't work properly, it didn't work at all.
So I replaced the router and again, port forwarding was not working.
There are no firewalls running and…
![](../../users/profiles/854.webp)
Herr
- 249
- 2
- 14
0
votes
1 answer
Enabling port forwarding on port 53 on a DNS server, why is it a risk?
Well, actually I know that the risk is that somebody from an external network could access IPs and hostnames of the machines on a local network, but I am struggling to understand if this is it or if there is something else.
If the devices on the…
![](../../users/profiles/8923.webp)
user1301428
- 1,927
- 1
- 23
- 28
0
votes
1 answer
Detect port forwarding
If there are 3 machines A, B and C and A communicate directly with B (A -> B) but B is executing port fordwarding with the next command
socat TCP4-LISTEN:443,fork TCP4::443
So in fact the communication is A -> B -> C. Is there any way…
![](../../users/profiles/277746.webp)
Paula
- 5
- 2
0
votes
1 answer
How to stop outgoing SSH on port 443
Let us say that a small company has an internal network for employees. All employees are granted Internet access via a NAT device (not a proxy) and perimeter firewall only allows outgoing connections to port 80 and 443. An attacker manages to…
![](../../users/profiles/9156.webp)
RedBaron
- 155
- 8
0
votes
0 answers
Metasploit double reverse portfwd issues
I'm having an issue pivoting with meterpreter and portfwd and I am starting to wonder if what I am trying to do is even possible. My attacker (we'll say 10.80.6.3) machine has a shell on victim 1 and I have added a route to victim 2 machine which is…
![](../../users/profiles/182018.webp)
UCProgrammer
- 113
- 6
0
votes
3 answers
Is http to https port forwarding a vulnerability?
I work in an organisation where a TMG server with port forwarding has been used successfully for a number of years to forward all http traffic to https for a particular web application. This meant that http or https would work on URLs for that web…
![](../../users/profiles/238479.webp)
dev123
- 3
- 2
0
votes
0 answers
Why to use Reverse Shell?
I know that reverse shells get the victim to connect to us, but I heard that people mostly use reverse shells Why use reverse shells when hacking a network outside our local network as we have to do port forwarding? It only brings some extra work.
user235696
0
votes
1 answer
MySQL vulnerability bind address 127.0.0.1
Am I safe from MySQL access from another host even if they know the credential of my database, including the port?
As far as I know the bing port doesn't allow any remote access. Correct me if I'm wrong.
![](../../users/profiles/194637.webp)
Born vs. Me
- 67
- 1
- 7
0
votes
1 answer
How could a bind shell open a port on a firewall in front of the target?
Is it possible for a software to open port in the router for my local device without permissions to access router setup page?
If it's not possible then how does a bind shell work?
user168532
0
votes
3 answers
Can an attacker with MitM privileges perform denial of service and other attacks besides interception on local LAN?
I would like to better understand what an attacker who has MitM control on a LAN can do to the victim. I understand that basically a MitM attack means you intercept traffic and can see the data [and also potentially modify].
Beyond this, can an…
![](../../users/profiles/167336.webp)
Wine
- 1
- 1
0
votes
1 answer
What are the risks of having a port forward through a NAT gateway to an unused IP?
I'm trying to determine if having a port forward on my NAT gateway to an unused IP address exposes me to any security risks. Obviously if a device ends up at the IP address then there is a potential for intrusion from the internet, but are there any…
![](../../users/profiles/152861.webp)
EdC
- 198
- 4