Questions tagged [port-forwarding]

82 questions
1
vote
1 answer

NMAP port scan on home router looks strange to me

Today I was playing around with Nmap on Ubuntu Linux. I performed a port scan on our home router with nmap -sV 192.168.1.1 The results were as follows: **Starting Nmap 7.01 ( https://nmap.org ) at 2016-09-18 12:08 SAST Nmap scan report for…
giujbikj
  • 11
  • 1
  • 4
1
vote
1 answer

Browser Autopwn2 Unable to Exploit "Victim" on Separate Network

Am using VMWare Workstation 10 Player. Kali Linux OS is Nat Windows XP is bridge That means both are on separate networks. I am trying to make Kali Exploit the XP box. Remote Windows is 192.168.1.9 and Local Kali Host is 192.168.88.129 On Kali I…
Rhonda
  • 143
  • 8
1
vote
1 answer

PCI and SSH Port forwarding

I am trying to convert a widows jump server to a Linux jump server. There are a few windows boxes behind this jumpserver, and I was wondering if I can just enable port forwarding over ssh with a password based ssh key, and rdp to those servers.…
yetdot
  • 706
  • 5
  • 7
1
vote
1 answer

ssh tunneling /port forwarding/access different subnet

Hi I need some good pointer or any recommendation any docs about this below stated scenario. During in my recent pentesting : My ip is 192.168.x.1(kali) By some how I managed to get root shell on some unix system with ip 192.168.x.21. Now when I…
Avik
  • 31
  • 1
  • 5
0
votes
3 answers

Attack vector: Internet Service Provider

I'm suspicious. I wanted to forward a port (80) on my router and noticed that port forwarding didn't work properly, it didn't work at all. So I replaced the router and again, port forwarding was not working. There are no firewalls running and…
Herr
  • 249
  • 2
  • 14
0
votes
1 answer

Enabling port forwarding on port 53 on a DNS server, why is it a risk?

Well, actually I know that the risk is that somebody from an external network could access IPs and hostnames of the machines on a local network, but I am struggling to understand if this is it or if there is something else. If the devices on the…
user1301428
  • 1,927
  • 1
  • 23
  • 28
0
votes
1 answer

Detect port forwarding

If there are 3 machines A, B and C and A communicate directly with B (A -> B) but B is executing port fordwarding with the next command socat TCP4-LISTEN:443,fork TCP4::443 So in fact the communication is A -> B -> C. Is there any way…
Paula
  • 5
  • 2
0
votes
1 answer

How to stop outgoing SSH on port 443

Let us say that a small company has an internal network for employees. All employees are granted Internet access via a NAT device (not a proxy) and perimeter firewall only allows outgoing connections to port 80 and 443. An attacker manages to…
RedBaron
  • 155
  • 8
0
votes
0 answers

Metasploit double reverse portfwd issues

I'm having an issue pivoting with meterpreter and portfwd and I am starting to wonder if what I am trying to do is even possible. My attacker (we'll say 10.80.6.3) machine has a shell on victim 1 and I have added a route to victim 2 machine which is…
UCProgrammer
  • 113
  • 6
0
votes
3 answers

Is http to https port forwarding a vulnerability?

I work in an organisation where a TMG server with port forwarding has been used successfully for a number of years to forward all http traffic to https for a particular web application. This meant that http or https would work on URLs for that web…
dev123
  • 3
  • 2
0
votes
0 answers

Why to use Reverse Shell?

I know that reverse shells get the victim to connect to us, but I heard that people mostly use reverse shells Why use reverse shells when hacking a network outside our local network as we have to do port forwarding? It only brings some extra work.
user235696
0
votes
1 answer

MySQL vulnerability bind address 127.0.0.1

Am I safe from MySQL access from another host even if they know the credential of my database, including the port? As far as I know the bing port doesn't allow any remote access. Correct me if I'm wrong.
Born vs. Me
  • 67
  • 1
  • 7
0
votes
1 answer

How could a bind shell open a port on a firewall in front of the target?

Is it possible for a software to open port in the router for my local device without permissions to access router setup page? If it's not possible then how does a bind shell work?
user168532
0
votes
3 answers

Can an attacker with MitM privileges perform denial of service and other attacks besides interception on local LAN?

I would like to better understand what an attacker who has MitM control on a LAN can do to the victim. I understand that basically a MitM attack means you intercept traffic and can see the data [and also potentially modify]. Beyond this, can an…
0
votes
1 answer

What are the risks of having a port forward through a NAT gateway to an unused IP?

I'm trying to determine if having a port forward on my NAT gateway to an unused IP address exposes me to any security risks. Obviously if a device ends up at the IP address then there is a potential for intrusion from the internet, but are there any…
EdC
  • 198
  • 4