Firewall bypass: Encapsulating traffic inside UDP
On our last post about UDP hole-punching we learned how we could use UDP traffic to exploit the stateful nature of firewalls, thus bypassing blocks for incoming connections. That was a fun exercise, but of limited use in the real world.
On this post we’re going to turn it