Overview
Explore BNAT (Broken NAT) hijacking and techniques for repairing broken communication channels in this 43-minute conference talk from AIDE 2012. Delve into Jonathan Claudius' background and expertise as he explains the concept of BNAT, providing real-world examples. Learn about essential tools and strategies, including how to stop resets and accept the center. Discover the intricacies of BPF and BNAT scanning, and understand the process of finding BNAT services. Gain insights into completing handshakes and utilizing Metasploit for practical applications. Follow along with a live demonstration featuring a client-tomcat exploit and reverse handler. Conclude with valuable closing thoughts on this advanced network security topic.
Syllabus
Intro
Jonathans Background
What is BNAT
BNAT Example 1
BNAT Example 3
Tools
Stop a Reset
Accepting the Center
What is beyond loop
The rest of the world would never consider that
How do you find this stuff
What is BPF
BNAT Scanner
Finding BNAT Services
How did you complete the handshake
Example
Metasploit
Meeting David
Scenario
Demo
Client
tomcat
Exploit
Reverse Handler
Closing Thoughts