How to connect main OS (Kali Linux) and Metasploitable on NAT network? [migrated]

I want to use Metasploitable as my testing OS on VirtualBox and I have Kali Linux installed as my main OS of the system.
If both the OS was on the virtual box then it was easy to make them connected on the same NAT network.
But I have inst… Continue reading How to connect main OS (Kali Linux) and Metasploitable on NAT network? [migrated]

What’s Hosted Behind ngrok.io?

A few weeks ago I wrote an ISC diary about a piece of malicious code that used ngrok.io to communicate with the C2 server. Just a quick reminder about this service: it provides a kind of reverse-proxy for servers or applications that people need to publish on the Internet. I

The post What’s Hosted Behind ngrok.io? appeared first on /dev/random.

Continue reading What’s Hosted Behind ngrok.io?

Windows Firewall allows the connection to more than one user who shares the same external IP address

I wrote a stand-alone anticheat. When the client anticheat connects to its server, the server creates a firewall rule allowing the game client to gain access to the server.
The problem is the firewall creates rules by IP address. If NAT is… Continue reading Windows Firewall allows the connection to more than one user who shares the same external IP address

Is opening all ports on a router safe if it is simply redirection to a VPN server at 192.168.1.2:51820?

The motive for doing this is that I want to open other ports so that I can evade firewalls which block VPN connections. Instead of redirecting eg. port 53 or 123, I could simply set up a destination NAT rule (my router allows ‘easy’ port f… Continue reading Is opening all ports on a router safe if it is simply redirection to a VPN server at 192.168.1.2:51820?

How to Prevent Attacker from Abusing IPv4-embedded IPv6 to Bypass Security Mechanism?

Section 5.3 of RFC6052 explained how an attacker could abuse the NAT64 translation mechanism to bypass security mechanism such as firewall or IDS/IPS if those devices only have an IPv4 blacklist. The mitigation is to convert the IPv4-embed… Continue reading How to Prevent Attacker from Abusing IPv4-embedded IPv6 to Bypass Security Mechanism?

IoT Device Takeovers Surge 100 Percent in 2020

The COVID-19 pandemic, coupled with an explosion in the number of connected devices, have led to a swelling in IoT infections observed on wireless networks. Continue reading IoT Device Takeovers Surge 100 Percent in 2020

This Week in Security: PunkBuster, NAT, NAS and MP3s

Ah, the ever-present PDF, and our love-hate relationship with the format. We’ve lost count of how many vulnerabilities have been fixed in PDF software, but it’s been a bunch over the years. This week, we’re reminded that Adobe isn’t the only player in PDF-land, as Foxit released a round of …read more

Continue reading This Week in Security: PunkBuster, NAT, NAS and MP3s