Penetration Testing mailing list archives
RE: How to tweak tools against targets that block ICMP
From: "Demetris Papapetrou" <dpapapetrou () internalaudit gov cy>
Date: Fri, 23 Jul 2010 08:56:45 +0300
Jack hi, I didn't have any stress problems with port forwarding tools so far. On the other hand, I didn't try to tunnel through them large amounts of data. Regarding your nessus/metasploit question, there is a really nice video by Netinfinity on SecurityTube showing how to run a Nessus scan through a compromised machine using SSH, proxychains and Metasploit's meterpreter. You will find it very informative. The link is: hxxp://www.securitytube.net/Running-a-Nessus-Scan-through-a-Compromised-Host -through-a-Meterpreter-Session-video.aspx You are welcome, Demetris Papapetrou -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Jacky Jack Sent: Thursday, July 22, 2010 9:21 PM To: Demetris Papapetrou Cc: security-basics () securityfocus com; pen-test () securityfocus com Subject: Re: How to tweak tools against targets that block ICMP Hi Demetris Papapetrou Now I know what you mean. I never think like this before. Your thinking is one of Top Pentester's smart thinking. My concern using port forwarding tools is that - Can they actually handle or route the traffic of all kinds - weird/high volume? - Can the host machine be affected if core scanners like nessus/metasplolit? Seems attacking own machine? Thanks. ------------------------------------------------------------------------ Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates. http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727 d1 ------------------------------------------------------------------------ ------------------------------------------------------------------------ This list is sponsored by: Information Assurance Certification Review Board Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT and CEPT certs require a full practical examination in order to become certified. http://www.iacertification.org ------------------------------------------------------------------------
Current thread:
- How to tweak tools against targets that block ICMP Jacky Jack (Jul 20)
- Re: How to tweak tools against targets that block ICMP Robert Portvliet (Jul 24)
- RE: How to tweak tools against targets that block ICMP Demetris Papapetrou (Jul 24)
- Re: How to tweak tools against targets that block ICMP Jacky Jack (Jul 24)
- RE: How to tweak tools against targets that block ICMP Demetris Papapetrou (Jul 24)
- RE: How to tweak tools against targets that block ICMP Demetris Papapetrou (Jul 24)
- Re: How to tweak tools against targets that block ICMP Robert Portvliet (Jul 24)