Главная
Study mode:
on
1
Intro
2
Jonathans Background
3
What is BNAT
4
BNAT Example 1
5
BNAT Example 3
6
Tools
7
Stop a Reset
8
Accepting the Center
9
What is beyond loop
10
The rest of the world would never consider that
11
How do you find this stuff
12
What is BPF
13
BNAT Scanner
14
Finding BNAT Services
15
How did you complete the handshake
16
Example
17
Metasploit
18
Meeting David
19
Scenario
20
Demo
21
Client
22
tomcat
23
Exploit
24
Reverse Handler
25
Closing Thoughts
Description:
Explore BNAT (Broken NAT) hijacking and techniques for repairing broken communication channels in this 43-minute conference talk from AIDE 2012. Delve into Jonathan Claudius' background and expertise as he explains the concept of BNAT, providing real-world examples. Learn about essential tools and strategies, including how to stop resets and accept the center. Discover the intricacies of BPF and BNAT scanning, and understand the process of finding BNAT services. Gain insights into completing handshakes and utilizing Metasploit for practical applications. Follow along with a live demonstration featuring a client-tomcat exploit and reverse handler. Conclude with valuable closing thoughts on this advanced network security topic.

BNAT Hijacking: Repairing Broken Communication Channels - Lecture

Add to list
0:00 / 0:00