The document discusses breaking and hijacking broken communication channels using Broken NAT Traversal (BNAT). It describes how BNAT works, developing tools to identify and attack BNAT sessions. The presentation demonstrates using BNAT-SCAN to discover hidden services and BNAT-ROUTER to hijack the newly discovered service and intercept communication. The conclusion discusses understanding gaps in security that allow such attacks and recommendations to close vulnerabilities.
How to Troubleshoot Apps for the Modern Connected Worker
BNAT Hijacking: Repairing Broken Communication Channels
1. BNAT Hijacking Repairing Broken Communication Channels Jonathan Claudius Rio Hotel and Casino August 5th, 2011 DefconSkytalk 2011 Security Begins with Trust
23. Some Info/Ref… Where to get this code? https://github.com/claudijd/BNAT-Suite How to find me? Name: Jonathan Claudius City: Chicago, IL Email: jclaudius@trustwave.com Twitter: @claudijd References http://code.google.com/p/packetfu/ http://www.netfilter.org/ http://blog.thc.org/index.php?/archives/2-Port-Scanning-the-Internet.html http://en.wikipedia.org/wiki/Iptables http://en.wikipedia.org/wiki/Network_address_translation http://en.wikipedia.org/wiki/Transmission_Control_Protocol https://cocktails365.files.wordpress.com/2010/04/barnapkin.jpg