The URL points to the security researcher's writeup on the attack and the page contains a link to proof of concept source code on github.
> Sent: Sunday, November 01, 2020 > From: "Robert" <i...@avantwireless.com> > To: af@af.afmug.com > Subject: Re: [AFMUG] NAT Slipstreaming - or how to attack any internal host > behind NAT > > Was that site a source of the "evil javascript"? > > On 11/1/20 5:39 AM, fiber...@mail.com wrote: > > Synopsis: NAT Slipstreaming allows an attacker to remotely access any > > TCP/UDP service bound to a victim machine, bypassing the victim's > > NAT/firewall (arbitrary firewall pinhole control), just by the victim > > visiting a website. > > > > https://samy.pl/slipstream/ > > > > > > > -- > AF mailing list > AF@af.afmug.com > http://af.afmug.com/mailman/listinfo/af_af.afmug.com > -- AF mailing list AF@af.afmug.com http://af.afmug.com/mailman/listinfo/af_af.afmug.com