All Questions
15 questions
1
vote
1
answer
7k
views
Is enabling software flow-offloading in OpenWRT's firewall settings dangerous?
First of all, I did ask this on OpenWrt Forums already, I thought maybe someone here knows this.
I noticed that my internet speed gets limited when this feature is not enabled, this feature is also ...
0
votes
1
answer
325
views
Windows Firewall allows the connection to more than one user who shares the same external IP address
I wrote a stand-alone anticheat. When the client anticheat connects to its server, the server creates a firewall rule allowing the game client to gain access to the server.
The problem is the firewall ...
1
vote
1
answer
437
views
Is opening all ports on a router safe if it is simply redirection to a VPN server at 192.168.1.2:51820?
The motive for doing this is that I want to open other ports so that I can evade firewalls which block VPN connections. Instead of redirecting eg. port 53 or 123, I could simply set up a destination ...
1
vote
0
answers
173
views
How to Prevent Attacker from Abusing IPv4-embedded IPv6 to Bypass Security Mechanism?
Section 5.3 of RFC6052 explained how an attacker could abuse the NAT64 translation mechanism to bypass security mechanism such as firewall or IDS/IPS if those devices only have an IPv4 blacklist. The ...
0
votes
0
answers
135
views
Is it possible to gather information about a destination-nat host?
Let's say that I'm connected to a network where the ISP has setup a dst-nat from an IP they don't control to an IP that they control,like so:
1- Their DNS server resolves example.xyz to 1.1.1.1 (the ...
6
votes
0
answers
380
views
Can NAT Table be vulnerable toward any poisoning attacks?
I am learning the general concept of network security, and becomes aware of two poisoning attacks on the network infrastructures, that is, DNS poisoning attacks and ARP poisoning attacks. They are ...
0
votes
1
answer
1k
views
IPv6 and NAT firewall effect
It seems that people still argue on whether to use NAT with IPv6 for its side-role as a firewall hiding inner network from the outside (providing user anonymity and security as well). I am wondering ...
12
votes
3
answers
37k
views
How to directly connect to devices behind NAT from the internet?
We have an IP address on the global internet: "A"
We only have access to "A".
We have a network behind a router that does NAT: 192.168.1.0/24
There is a client behind that NAT: "B"
We don't have ...
3
votes
2
answers
894
views
How to restrict access to the internet for some computers on the network?
I’d like to differentiate machines (or, possibly, users) on my small business network so that only some of them have access to the internet. The solution I’ve been using to this day is quite terrible: ...
10
votes
1
answer
4k
views
Vulnerabilities of pure NAT without firewall
Following some of the comments on this question, I was curious about the security vulnerabilities of NAT. There are similar threads here and here but they discuss router vulnerabilities rather than ...
4
votes
2
answers
3k
views
how can an attacker access a system through a compromised router?
Let's say an attacker gained access to the admin panel of a home router with port 21, 23 and 80 open.
I mean the attacker has full control over the router, thus being able to port forward, etc...
...
3
votes
1
answer
449
views
Can NATs and firewalls blacklist IPs when trying to UDP hole punch?
I am developing a P2P application that will make use of UDP hole punch to connect two peers behind NAT.
When dealing with connections between a cone and a symmetric, unpredictable NATs, however, hole ...
2
votes
1
answer
218
views
Should reverse connections be used to bypass NATs?
I'm planning on doing a demonstration on how remote administrative tools work for my schools computer security club. I plan on writing a RAT in C++ and demonstrating/explaining how it works. I ran ...
2
votes
1
answer
3k
views
Setting up NAT with firewall for RDP connection
I have a vendor who needs to connect remotely to one of our servers. What I thought I would do is setup a NAT rule in our firewall. I have a public IP address that I will have translated to the local ...
77
votes
7
answers
92k
views
With IPv6 do we need to use NAT anymore?
I'm wondering how to use NAT with IPv6. It seems that you don't even need NAT anymore.
What exactly is the concept behind firewall configurations in IPv6 environments?