Metasploit mailing list archives
Listeners that hijacking exisiting listen ports
From: Konrads Smelkovs <konrads () smelkovs com>
Date: Tue, 1 Dec 2009 17:23:28 +0200
Hello, This is just a quick idea I came up with and I wonder if it is implementable at all. Sometimes, when exploiting vulnerabilities in DMZ systems it will be difficult or impossible to get remote shell, because firewall will filter incoming and outgoing connections. Would it be possible to hijack the listening socket through which exploit arrived to a specially crafted code, which would listen to that socket instead and if first 10 bytes are magic string, then it spawns a shell, if not, then passess the traffic back to original socket? -- Konrads Smelkovs Applied IT sorcery.
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- Listeners that hijacking exisiting listen ports Konrads Smelkovs (Dec 01)
- Re: Listeners that hijacking exisiting listen ports HD Moore (Dec 01)
- multiple remote windows open on vncinject Jeffs (Dec 01)
- Re: multiple remote windows open on vncinject Patrick Webster (Dec 02)
- the rewriting of exploit.rb Jeffs (Dec 02)
- Re: the rewriting of exploit.rb Jeffs (Dec 02)
- pardon me for plugging Rapid7 Jeffs (Dec 02)
- Re: pardon me for plugging Rapid7 Danux (Dec 02)
- multiple remote windows open on vncinject Jeffs (Dec 01)
- Re: Listeners that hijacking exisiting listen ports Amin Tora (Dec 01)
- Re: Listeners that hijacking exisiting listen ports HD Moore (Dec 01)