Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Pwnat: NAT to NAT client-server communication (samy.pl)
5 points by j_s on Aug 17, 2017 | hide | past | favorite | 1 comment


Wow. This is awesome. So essentially the client pretends to be a "hop" with a specifically crafted ICMP packet. The NAT simply forwards it along as if it were expecting it. Neat!

The only thing stopping this would be flooding these ICMP packets to pwnat servers. The server would get the wrong IP and do extra work. In practice, it would be difficult to figure out if pwnat is running since it probably isn't meant to be a long running process.

Also: I know that some providers prevent UDP forging on the "source" address. Do they do this also at the ICMP level? If so, I guess this is another set back.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: