1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

News Hacker releases NAT traversal tool

Discussion in 'Article Discussion' started by CardJoe, 5 Apr 2010.

  1. CardJoe

    CardJoe Freelance Journalist

    Joined:
    3 Apr 2007
    Posts:
    11,343
    Likes Received:
    292
  2. yuusou

    yuusou Well-Known Member

    Joined:
    5 Nov 2006
    Posts:
    2,082
    Likes Received:
    320
    Ohhh... interesting...
     
  3. Tulatin

    Tulatin The Froggy Poster

    Joined:
    16 Oct 2003
    Posts:
    3,161
    Likes Received:
    7
    Oh hey, it's just what Skype does but in Malicious form.
     
  4. eddtox

    eddtox Homo Interneticus

    Joined:
    7 Jan 2006
    Posts:
    1,296
    Likes Received:
    15
    That's a bit worrying :-(
     
  5. mjm25

    mjm25 New Member

    Joined:
    19 Jan 2009
    Posts:
    507
    Likes Received:
    28
    i'm surprised he hasn't been hired yet...
     
  6. Veles

    Veles DUR HUR

    Joined:
    18 Nov 2005
    Posts:
    6,188
    Likes Received:
    34
    Uplink is here!
     
  7. War-Rasta

    War-Rasta New Member

    Joined:
    22 May 2002
    Posts:
    398
    Likes Received:
    0
    There's a truckload of possible legitimate uses for this but the fear of malicious apps will never go away. At least the fact that the code is fully available means that security software could possibly be developed to detect this on the PC itself.
     
  8. amacieli

    amacieli New Member

    Joined:
    14 Feb 2008
    Posts:
    93
    Likes Received:
    1
    And, just as Pirate Bay and IsoHunt are shutting down, the p2p darknet has given birth.
     
  9. saspro

    saspro IT monkey

    Joined:
    23 Apr 2009
    Posts:
    9,285
    Likes Received:
    231
    So it's like hamachi but not made by logmein. Hmmn.
    I think I'll have a read through the source code.
     
  10. Psytek

    Psytek New Member

    Joined:
    23 Dec 2008
    Posts:
    159
    Likes Received:
    3
    " it's something that will give those who rely on NAT 'firewalls' for protection pause for thought "

    No it won't, even the stupidest, inexperienced admin knows that port blocking will only stop casual users from using a particular service. To anyone with half a brain and access to google, port blocking is just like moving a door 5 meters to the left, just as easy to walk through.
     
  11. Shagbag

    Shagbag All glory to the Hypnotoad!

    Joined:
    9 Nov 2006
    Posts:
    320
    Likes Received:
    4
    I must be missing something here. If my firewall is instructed to drop all incoming IP packets (regardless of protocol) that don't pertain to an already established connection, just how does this make my firewall insecure?
     
  12. LucusLoC

    LucusLoC New Member

    Joined:
    28 Nov 2006
    Posts:
    91
    Likes Received:
    3
    @psytek
     
  13. LucusLoC

    LucusLoC New Member

    Joined:
    28 Nov 2006
    Posts:
    91
    Likes Received:
    3
    damn tab button, lets have another go at that shall we?

    @psytec

    very true.

    that is all.
     
  14. Shagbag

    Shagbag All glory to the Hypnotoad!

    Joined:
    9 Nov 2006
    Posts:
    320
    Likes Received:
    4
    Loren ipsum
     
  15. MarkW7

    MarkW7 Total Noob

    Joined:
    30 Nov 2008
    Posts:
    1,795
    Likes Received:
    32
    That guys quite a programmer, shame he didn't bring myspace down.
     
  16. OleJ

    OleJ Me!

    Joined:
    1 Jul 2007
    Posts:
    2,024
    Likes Received:
    10
    No it's not worrying. It's a tunnel! You might as well call VPN, SSH etc "worrying".
    As "saspro" mentions above "it's like hamahachi".

    It does NOT mean that anyone can bypass your NAT and reach all machines on the LAN. The tool needs to be running on both sides of the NAT for that to be possible.

    ...meh

    Oh and if you rely on port-blocking for security on outgoing traffic then you're only asking for it anyways.
     
  17. Dead Ghost

    Dead Ghost New Member

    Joined:
    11 May 2007
    Posts:
    79
    Likes Received:
    0
    How come? Can you explain please? If this tool will be used for p2p public trackers, others (ie law enforcers) won't see your IP? How will you remain hidden?
     
  18. dyzophoria

    dyzophoria Member

    Joined:
    3 May 2004
    Posts:
    392
    Likes Received:
    1
    as OleJ has mentioned, isnt it just a tunnel?
     
  19. StoneyMahoney

    StoneyMahoney New Member

    Joined:
    10 Jul 2009
    Posts:
    287
    Likes Received:
    13
    "transmitted without the owner's knowledge"

    The security risk in this situation comes from a network user doing things they shouldn't - be it connecting to malicious remote sites or acting maliciously themselves - and is thus nothing new. It would let people upload stolen data to their own computer at home, rather than a 3rd-party FTP site, which actually makes it far easier to prove it was them what done it, off'sah.

    Move along, nothing new to see here.

    Besides, any sysadmin with half a brain knows how to configure a real firewall.

    1 - Block everything in both directions.
    2 - Add exceptions for valid traffic.
    3 - User's machine do *nothing* external directly - it's by proxy or not at all.
     
  20. ViceVirtue

    ViceVirtue New Member

    Joined:
    3 Jun 2005
    Posts:
    4
    Likes Received:
    0
    This tool is legitimate, and I thank Samy for his research (bloody well done)

    Yes, this is like what Skype does, except it does it without a central server (Skype's servers act as a rendezvous point) making this method much more useful for use in peer-to-peer applications.

    There is no need for Administrators to be concerned by this - NAT is *not* a method for locking-down a network. There is some inherent security in placing clients behind a NAT, and that hasn't been circumvented by this tool.
     
Tags: Add Tags

Share This Page