BNAT Hijacking: Repairing Broken Communication Channels - Lecture
Offered By: YouTube
Course Description
Overview
Explore BNAT (Broken NAT) hijacking and techniques for repairing broken communication channels in this 43-minute conference talk from AIDE 2012. Delve into Jonathan Claudius' background and expertise as he explains the concept of BNAT, providing real-world examples. Learn about essential tools and strategies, including how to stop resets and accept the center. Discover the intricacies of BPF and BNAT scanning, and understand the process of finding BNAT services. Gain insights into completing handshakes and utilizing Metasploit for practical applications. Follow along with a live demonstration featuring a client-tomcat exploit and reverse handler. Conclude with valuable closing thoughts on this advanced network security topic.
Syllabus
Intro
Jonathans Background
What is BNAT
BNAT Example 1
BNAT Example 3
Tools
Stop a Reset
Accepting the Center
What is beyond loop
The rest of the world would never consider that
How do you find this stuff
What is BPF
BNAT Scanner
Finding BNAT Services
How did you complete the handshake
Example
Metasploit
Meeting David
Scenario
Demo
Client
tomcat
Exploit
Reverse Handler
Closing Thoughts
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network