01/16/2026 | Press release | Distributed by Public on 01/15/2026 17:47
In modern network architecture, we often assume that perimeter defences are robust enough to keep internal traffic secure. However, vulnerabilities inherent in the trust mechanisms of fundamental network protocols reveal that unencrypted tunnels can become fatal backdoors in enterprise intranets.
Research that I presented at Black Hat USA 2025 titled 'From Spoofing to Tunnelling' demonstrates how attackers can leverage IP spoofing combined with common tunnelling protocols - specifically Generic Routing Encapsulation (GRE) and Virtual Extensible LAN (VXLAN) - to infiltrate intranets without initial access credentials.
This research shifts IP spoofing from a simple Distributed Denial of Service (DDoS) mechanism to a stealthy infiltration tool for Red Teams. In this blog post, we'll dissect the three core architectural vulnerabilities highlighted in my research.
Intranet IP spoofing
Traditional lateral movement leaves a clear trail of connection logs on compromised hosts, allowing Incident Response (IR) teams to trace the attack path back to 'patient zero'. My research introduces a technique using 'Intranet IP Spoofing' to create a forensic 'breakpoint', making the attack source nearly impossible to trace via standard Layer 3 logs.
The 'ghost' attack unfolds in three movements.
This creates a 'ghost' in the intranet. Network logs on the victim server show connections coming from random public IPs rather than an internal private IP, leading IR teams to suspect external brute force attempts rather than an active internal compromise. If defenders block the attacker's IP, the attacker simply rotates to a new public IP.
To counter Internet Service Providers (ISPs) that drop packets with private source IPs, the research details methods that trigger Source Network Address translation (NAT) to force the router to open a temporary Destination NAT, maintaining bidirectional communication. For instance, triggering the H.323 NAT helper or sending TCP SYN packets can be used to bypass ISP filters.
GRE spoofing initial access: Scanning for invisible tunnels
Can an attacker penetrate an intranet without any internal foothold? The research confirms that widely used, unencrypted GRE tunnels serve as open doors if exposed to the Internet.
The primary challenge is locating the tunnel endpoints. I developed a novel scanning technique using Internet Control Message Protocol (ICMP) encapsulation:
Once the Peer IP is known, the attacker can forge GRE packets from the public Internet that look like they originated from the trusted tunnel peer. This allows the attacker to inject malicious traffic (such as DNS requests or HTTP commands) directly into the intranet. The victim router, trusting the GRE encapsulation, forwards the malicious packets to internal servers, effectively bridging the air gap without a compromised host.
A VXLAN nightmare
VXLAN is a standard for extending Layer 2 networks over Layer 3 infrastructure, common in data centres and Software-Defined Wide Area Network (SD-WANs). My research takes advantage of a default configuration flaw in Linux kernels and MikroTik RouterOS that leads to a security nightmare: The Learning Mode vulnerability.
By default, the VXLAN interface on Linux enables Learning Mode. This means if the interface receives a valid VXLAN packet, with a correct virtual network interface (VNI) and port, it automatically adds the Source IP and MAC address to its Forwarding Database (FDB).
The attack methodology works like this:
A stark warning
This research serves as a stark warning against the 'implicit trust' found in legacy tunnelling protocols. To secure these architectures, network operations teams must:
Check out the whitepaper I wrote and my presentation slides for a more comprehensive description of this attack vector.
Shu-Hao Tung is a cybersecurity specialist from Taiwan, currently based in Vancouver. He has over four years of penetration testing experience and has presented his research at premier security conferences, including Black Hat USA, DEF CON, and HITCON.
The views expressed by the authors of this blog are their own and do not necessarily reflect the views of APNIC. Please note a Code of Conduct applies to this blog.