Slipstream (also referred to as “NAT Slipstreaming”) is a proof-of-concept exploit framework that allows an attacker to remotely access any TCP or UDP service running on a victim machine inside a NAT (behind a router/firewall) simply by tricking the target to visit a malicious website. It works by abusing the NAT’s Application Level Gateway (ALG) logic and connection tracking, combined with browser capabilities like WebRTC, precise packet fragmentation or boundary control, and packet injection techniques. The attack is able to bypass browser port restrictions by fragmenting or massaging packets so that the “exploit payload” lands in a packet boundary that gets parsed by the NAT/ALG as a legitimate protocol packet (e.g. SIP or H.323). Once successful, the NAT/firewall is deceived into opening a “hole” (port forwarding) back to the internal host, enabling the attacker to connect directly to internal services.
Features
- Automated detection of vulnerable NAT/ALG behavior in target routers
- Support for more protocols beyond SIP/H.323 (e.g. FTP, RTSP)
- A modular API so new injection techniques or packet boundary strategies can be added
- Simulation or emulation mode for testing against virtual NATs and firewall topologies
- Integrated reporting and logging of successful attack paths and vulnerabilities
- Defensive check mode that alerts if a system is vulnerable to slipstream attacks