Metasploit mailing list archives

Question:


From: eresemeth at gmail.com (Rory Garton Smith)
Date: Tue, 11 Sep 2007 18:26:42 +0800

Thankyou for your quick response. However I'm afraid it didn't quite
suffice.

I'll try to give an unambiguous scenario.

I am behind a firewall, I have forwarded a port to me. I exploit something
remotely, that is behind a firewall. To exploit it remotely, if it is behind
a firewall, will it have to be exploited on a port that is forwarded to the
box I am looking to get to?

On 9/11/07, Konrads Smelkovs <konrads.smelkovs at gmail.com> wrote:

This question is best answered with mu -
http://catb.org/jargon/html/M/mu.html


On 9/11/07, Rory Garton Smith <eresemeth at gmail.com> wrote:

Evening,
In relation to exploiting someone from behind a router, or exploiting
someone who is behind a router.

How can it be done? Is it necessary to forward ports? Or is it not
necessary at all. Does it require to have reverse connection?

Or can it not be done at all (remotely) unless you're aware of a
forwarded port not in use and such.

Thankyou, sorry to trouble
-Rorrr




--
Konrads Smelkovs
Applied IT sorcery.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070911/a75a23ac/attachment.htm>


Current thread: