Questions tagged [nat]
Network Address Translation, or NAT, is a method of remapping an IP address from one IP space to another (for example the internet to your local 192.168.x address) by modifying the IP address information in the IP datagram while they're in transit.
78 questions
16votes
4answers
4kviews
How are users traced via their IP when ISPs use NAT?
Since my ISP uses NAT, I will share the same public facing IP address with other customers. If I go to a website and perform an action (posting a message, uploading an image, etc.) then my IP address ...
1vote
0answers
77views
Identifying user behind a router [closed]
I have a small intranet, in which I have complete control over its deployment. I can even do MiTM, packet inspection/injection etc. There is a router and then there are 5 users behind the routers. The ...
0votes
0answers
65views
UNC Path Injection Testing over NAT
I am penetration tester. I am struggling to check for UNC path injections in the web apps because of the environment that I am in. I am conducting a pentest of a web app in my company's local network. ...
-2votes
1answer
97views
How I can access to home CCTVS form laptop? [closed]
I want to see my CCTV camers at home, when i am not home, but I know the Publick Ip address and NAT address (private addreess) of CCTV registrator. Manifacture of Camers is Hikvision home I am using ...
1vote
1answer
454views
VPN for accessing server behind home router
We have a server setup on our private network for various things. I'd like to be able to access services on this machine whether I'm at home, or on the road. Our provider is Starlink, which does not ...
-5votes
1answer
179views
My Tutors reasoning of how NAT provides security [closed]
I don't consider NAT a security measure at all but here is my teachers reasoning of how NAT provides security. My course has been appalling and this reasoning is just laughable to me. This is a £3000 ...
0votes
1answer
279views
Is NAT66 increasing security?
NAT is so standard for IPv4 that nobody thinks about it but for IPv6 it's considered a really bad option. (Article from APNIC) Of course there's the stateless NPTv6 and the firewall can be configured ...
1vote
1answer
539views
IPv6 address leaking despite VPN?
Given that commands like ifconfig or ip address don't require root privileges, apps can access information about ip address. If you use ipv4, you are normally behind NAT and apps would get an address ...
0votes
1answer
146views
Internet connection issues with new cable broadband (100/10) service, intermittently able to reach neighbor's management interface at 192.168.x.x?
I'm unfamiliar with coax broadband provisioning specifics with new (100/10) service in a residential neighborhood, and intermittently getting Internet disconnections and interestingly discovered the ...
1vote
1answer
8kviews
Is enabling software flow-offloading in OpenWRT's firewall settings dangerous?
First of all, I did ask this on OpenWrt Forums already, I thought maybe someone here knows this. I noticed that my internet speed gets limited when this feature is not enabled, this feature is also ...
0votes
0answers
23views
Methods for device enumeration behind NAT and its prevention [duplicate]
What methods do exist for enumeration devices behind a NAT from the upstream connection? I found sflow which uses TTL values. Are there other ways? I think this is partially related to OS ...
0votes
1answer
330views
Windows Firewall allows the connection to more than one user who shares the same external IP address
I wrote a stand-alone anticheat. When the client anticheat connects to its server, the server creates a firewall rule allowing the game client to gain access to the server. The problem is the firewall ...
1vote
1answer
448views
Is opening all ports on a router safe if it is simply redirection to a VPN server at 192.168.1.2:51820?
The motive for doing this is that I want to open other ports so that I can evade firewalls which block VPN connections. Instead of redirecting eg. port 53 or 123, I could simply set up a destination ...
1vote
0answers
175views
How to Prevent Attacker from Abusing IPv4-embedded IPv6 to Bypass Security Mechanism?
Section 5.3 of RFC6052 explained how an attacker could abuse the NAT64 translation mechanism to bypass security mechanism such as firewall or IDS/IPS if those devices only have an IPv4 blacklist. The ...
0votes
2answers
692views
How to ban IP address behind NAT
I am creating WebSocket server with rust and tokio and I want to prevent DDos attacks and spams. So I thought of creating HashMap and inserting IP address for 1 hour which i suspect is trying to do ...