Metasploit mailing list archives

Question:


From: eresemeth at gmail.com (Rory Garton Smith)
Date: Tue, 11 Sep 2007 17:07:53 +0800

Evening,
In relation to exploiting someone from behind a router, or exploiting
someone who is behind a router.

How can it be done? Is it necessary to forward ports? Or is it not necessary
at all. Does it require to have reverse connection?

Or can it not be done at all (remotely) unless you're aware of a forwarded
port not in use and such.

Thankyou, sorry to trouble
-Rorrr
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070911/bbb6821b/attachment.htm>


Current thread: