Skip to main content

All Questions

Tagged with
Filter by
Sorted by
Tagged with
1 vote
1 answer
7k views

Is enabling software flow-offloading in OpenWRT's firewall settings dangerous?

First of all, I did ask this on OpenWrt Forums already, I thought maybe someone here knows this. I noticed that my internet speed gets limited when this feature is not enabled, this feature is also ...
Sir Muffington's user avatar
0 votes
1 answer
325 views

Windows Firewall allows the connection to more than one user who shares the same external IP address

I wrote a stand-alone anticheat. When the client anticheat connects to its server, the server creates a firewall rule allowing the game client to gain access to the server. The problem is the firewall ...
David Figueras Tamame's user avatar
1 vote
1 answer
437 views

Is opening all ports on a router safe if it is simply redirection to a VPN server at 192.168.1.2:51820?

The motive for doing this is that I want to open other ports so that I can evade firewalls which block VPN connections. Instead of redirecting eg. port 53 or 123, I could simply set up a destination ...
The Legend 27's user avatar
1 vote
0 answers
173 views

How to Prevent Attacker from Abusing IPv4-embedded IPv6 to Bypass Security Mechanism?

Section 5.3 of RFC6052 explained how an attacker could abuse the NAT64 translation mechanism to bypass security mechanism such as firewall or IDS/IPS if those devices only have an IPv4 blacklist. The ...
maximillian1's user avatar
0 votes
0 answers
135 views

Is it possible to gather information about a destination-nat host?

Let's say that I'm connected to a network where the ISP has setup a dst-nat from an IP they don't control to an IP that they control,like so: 1- Their DNS server resolves example.xyz to 1.1.1.1 (the ...
MOHAMMAD RASIM's user avatar
6 votes
0 answers
380 views

Can NAT Table be vulnerable toward any poisoning attacks?

I am learning the general concept of network security, and becomes aware of two poisoning attacks on the network infrastructures, that is, DNS poisoning attacks and ARP poisoning attacks. They are ...
lllllllllllll's user avatar
0 votes
1 answer
1k views

IPv6 and NAT firewall effect

It seems that people still argue on whether to use NAT with IPv6 for its side-role as a firewall hiding inner network from the outside (providing user anonymity and security as well). I am wondering ...
sasuke_X220's user avatar
12 votes
3 answers
37k views

How to directly connect to devices behind NAT from the internet?

We have an IP address on the global internet: "A" We only have access to "A". We have a network behind a router that does NAT: 192.168.1.0/24 There is a client behind that NAT: "B" We don't have ...
Marina Ala's user avatar
3 votes
2 answers
894 views

How to restrict access to the internet for some computers on the network?

I’d like to differentiate machines (or, possibly, users) on my small business network so that only some of them have access to the internet. The solution I’ve been using to this day is quite terrible: ...
Édouard's user avatar
  • 131
10 votes
1 answer
4k views

Vulnerabilities of pure NAT without firewall

Following some of the comments on this question, I was curious about the security vulnerabilities of NAT. There are similar threads here and here but they discuss router vulnerabilities rather than ...
Michael B's user avatar
  • 466
4 votes
2 answers
3k views

how can an attacker access a system through a compromised router?

Let's say an attacker gained access to the admin panel of a home router with port 21, 23 and 80 open. I mean the attacker has full control over the router, thus being able to port forward, etc... ...
mumei's user avatar
  • 59
3 votes
1 answer
449 views

Can NATs and firewalls blacklist IPs when trying to UDP hole punch?

I am developing a P2P application that will make use of UDP hole punch to connect two peers behind NAT. When dealing with connections between a cone and a symmetric, unpredictable NATs, however, hole ...
Matteo Monti's user avatar
2 votes
1 answer
218 views

Should reverse connections be used to bypass NATs?

I'm planning on doing a demonstration on how remote administrative tools work for my schools computer security club. I plan on writing a RAT in C++ and demonstrating/explaining how it works. I ran ...
Dopaminergic's user avatar
2 votes
1 answer
3k views

Setting up NAT with firewall for RDP connection

I have a vendor who needs to connect remotely to one of our servers. What I thought I would do is setup a NAT rule in our firewall. I have a public IP address that I will have translated to the local ...
user avatar
77 votes
7 answers
92k views

With IPv6 do we need to use NAT anymore?

I'm wondering how to use NAT with IPv6. It seems that you don't even need NAT anymore. What exactly is the concept behind firewall configurations in IPv6 environments?
JaafarMehrez's user avatar