Metasploit mailing list archives
Question:
From: konrads.smelkovs at gmail.com (Konrads Smelkovs)
Date: Tue, 11 Sep 2007 12:43:43 +0300
This question is best answered with mu - http://catb.org/jargon/html/M/mu.html On 9/11/07, Rory Garton Smith <eresemeth at gmail.com> wrote:
Evening, In relation to exploiting someone from behind a router, or exploiting someone who is behind a router. How can it be done? Is it necessary to forward ports? Or is it not necessary at all. Does it require to have reverse connection? Or can it not be done at all (remotely) unless you're aware of a forwarded port not in use and such. Thankyou, sorry to trouble -Rorrr
-- Konrads Smelkovs Applied IT sorcery. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070911/3daaf42a/attachment.htm>