Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

The project's method outdated #10

Open
hplc opened this issue Feb 24, 2017 · 13 comments
Open

The project's method outdated #10

hplc opened this issue Feb 24, 2017 · 13 comments

Comments

@hplc
Copy link

hplc commented Feb 24, 2017

Note: pwnat defaults source and destination ports to 2222.

Most NAT would change source port to another number, while by monitoring data out NAT we can watch that. So to get the real source port out NAT, we need a third server to monitor that, maybe like N2N does.

@samyk
Copy link
Owner

samyk commented Feb 24, 2017

Not all NATs do this, but yes, more are port munging these days (however it's much less likely for UDP). If one of the NATs is doing this and the other isn't, you can use the birthday paradox to get a 99% chance of packet exchange in ~533 packets (actually less by if you know the port range the opposing side will use).

@bauen1
Copy link

bauen1 commented Feb 24, 2017

I'm not too sure if it is possible to to "proxy" through CGNAT (carrier grade NAT), but its getting more and more common here in Europe, so it would be a great thing to add.

@Zibri
Copy link

Zibri commented Apr 15, 2019

I think the best way to f*ck any nat would be to use webrtc think about it.

@samyk
Copy link
Owner

samyk commented Apr 15, 2019

@bauen1 can you share the specific elements of CGNAT that you found are specifically difficult to bypass?

@samyk
Copy link
Owner

samyk commented Apr 15, 2019

@Zibri Agreed -- though it's less the protocols and more the fact that you can induce a browser to perform actions on behalf of the client. STUN+TURN+ICE have some useful properties that can be used to perform fun and bad things to a victim; I'll be releasing a tool shortly :)

@bauen1
Copy link

bauen1 commented Apr 15, 2019

I'm not entirely sure what didn't work since I tested this a long time ago, but if you ping me in a few days, I should have some time to look at it again (more closely)

@Zibri
Copy link

Zibri commented Apr 16, 2019

@Zibri Agreed -- though it's less the protocols and more the fact that you can induce a browser to perform actions on behalf of the client. STUN+TURN+ICE have some useful properties that can be used to perform fun and bad things to a victim; I'll be releasing a tool shortly :)

What I would do is this:
command line utility that connects to a TURNS relay and opens a listening port for anything

Example:
10.0.05 >>> turn server >> map port YYY to XXXX

anyone else >>> turn server port XXXX >>> connects to 10.0.0.5 port YYY

contact me privately at zibri AT zibri DOT org.. so I can give you some relay servers easily :D

@Zibri
Copy link

Zibri commented Mar 4, 2020

@Zibri Agreed -- though it's less the protocols and more the fact that you can induce a browser to perform actions on behalf of the client. STUN+TURN+ICE have some useful properties that can be used to perform fun and bad things to a victim; I'll be releasing a tool shortly :)

what tool?

@tlsalex
Copy link

tlsalex commented Apr 9, 2020

what tool ?

@master-hax
Copy link

@Zibri Agreed -- though it's less the protocols and more the fact that you can induce a browser to perform actions on behalf of the client. STUN+TURN+ICE have some useful properties that can be used to perform fun and bad things to a victim; I'll be releasing a tool shortly :)

@samyk any news on this tool? :)

@wallabra
Copy link

wallabra commented Oct 1, 2021

I'm not entirely sure what didn't work since I tested this a long time ago, but if you ping me in a few days, I should have some time to look at it again (more closely)

Ping!

@samyk
Copy link
Owner

samyk commented Oct 1, 2021

@Gustavo6046 @master-hax @tlsalex @Zibri Sorry for the late reply, the tool was NAT Slipstreaming: https://samy.pl/slipstream/

@wallabra
Copy link

wallabra commented Oct 3, 2021

Oh, that is perfectly fine, don't sweat! :)

I can't wait to see how this unrolls now.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

7 participants