Penetration Testing mailing list archives
RE: command-line reverse connection tunnel?
From: "Filip Maertens" <filip () securax be>
Date: Sat, 15 Mar 2003 23:57:32 +0100
have successfully tested it in a pen test stituation in the lab for
doing
reverse connectivity. I think this would be a valuable tool for all
people I beg to differ. What exactly is different from using netcat listeners on both, attack-client and target machine? All in all, using a reverse telnet technique using netcat isn't very much a big an issue? I think this is a handy tool, but I would like to emphasize one can also use netcat in doing so (if this had been mentioned before in the "old posts", disregard this post, since I didn't followed this thread). Fil -- Filip Maertens @ Home http://www.compsec.be ---------------------------------------------------------------------------- Did you know that you have VNC running on your network? Your hacker does. Plug your security holes now! Download a free 15-day trial of VAM: http://www2.stillsecure.com/download/sf_vuln_list.html
Current thread:
- Re: command-line reverse connection tunnel? Steven Gill (Mar 14)
- RE: command-line reverse connection tunnel? Filip Maertens (Mar 16)
- RE: Netstumbling - FBI response Greg Reber (Mar 17)
- <Possible follow-ups>
- RE: command-line reverse connection tunnel? Steven Gill (Mar 17)
- RE: command-line reverse connection tunnel? Paul Bakker (Mar 18)
- RE: command-line reverse connection tunnel? the1 (Mar 18)
- RE: command-line reverse connection tunnel? Filip Maertens (Mar 16)