Metasploit mailing list archives
Http-Tunnel Question
From: thomas.werth at vahle.de (Thomas Werth)
Date: Fri, 21 Apr 2006 07:54:34 +0200
Hi, Actual i tested how to leak a firewall using http-tunnel. Using software from http://www.http-tunnel.com/ makes it quite easy, additional i found gnu http tunnel beeing open source. So i guess including this in ones evil planes might be easy. Blocking first one is easy by forbidding proxy end hosts, but second one with random "tunnel end servers" seems to be impossible. Am i wrong , are there other tricks to stop it ( firewalling each host with personal firewall for example ) ? Now my question : Would it be easy to create a http-tunnel payload , so an attack can be connect back through firewall to outside and infiltrate a firm intranet ? Maybe with an auto-proxy setting from i.e. or similar ? Or is size for this payload to big to fit into an overflow , so only really spezialied hackers are able to create such hacks ? Target of my question is : May this vuln be exploited ( in future ) by a worm or more likley only a vision for a good hacker with high motivation ? Would it be possible to add such a payload into metasploit ? greets Thomas
Current thread:
- Http-Tunnel Question Thomas Werth (Apr 20)
- Http-Tunnel Question Jerome Athias (Apr 21)
- Http-Tunnel Questions the unknown unknown (Apr 21)
- Http-Tunnel Question H D Moore (Apr 21)
- Http-Tunnel Question Chris Byrd (Apr 21)
- Http-Tunnel Question Jason Haar (Apr 22)
- Http-Tunnel Question Thomas Werth (Apr 23)
- Http-Tunnel Question Jerome Athias (Apr 21)