Knock, knock. Who’s there? NAT. Nat who? A NAT URL-borne killer

Ben Seri and Gregory Vishnepolsky, threat researchers at Armis, have found a way to expand upon the NAT Slipstream attack disclosed last year by Samy Kamkar, CSO of Openpath Security. The original NAT Slipstream potentially allowed a miscreant to access any TCP/UDP service tied to a victim’s machine by bypassing the victim’s NAT (Network Address Translation) and firewall defenses.

Read full article on The Register

 


Date:

Categorie(s):

Tag(s):