The URL points to the security researcher's writeup on the attack and the page 
contains a link to proof of concept source code on github.

> Sent: Sunday, November 01, 2020
> From: "Robert" <i...@avantwireless.com>
> To: af@af.afmug.com
> Subject: Re: [AFMUG] NAT Slipstreaming - or how to attack any internal host 
> behind NAT
>
> Was that site a source of the "evil javascript"?
>
> On 11/1/20 5:39 AM, fiber...@mail.com wrote:
> > Synopsis: NAT Slipstreaming allows an attacker to remotely access any 
> > TCP/UDP service bound to a victim machine, bypassing the victim's 
> > NAT/firewall (arbitrary firewall pinhole control), just by the victim 
> > visiting a website.
> >
> > https://samy.pl/slipstream/
> >
> >
>
>
> --
> AF mailing list
> AF@af.afmug.com
> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
>

-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com

Reply via email to