Nmap Development mailing list archives

Re: An idea


From: Nuno Gonçalves <nunojpg () gmail com>
Date: Wed, 2 Feb 2011 04:28:01 -0800

Maybe ncat can have a "--udp-tunnel" option as an advance of the "-k" ?

When used like:
ncat --udp-tunnel -l 53 --sh-exec "minibill@89.16.178.89 \"ncat -u 8.8.8.8 53\""

It will start and keep the connection open, and consider any incoming
connection as if it was from the same host.
This can bring problems it two clients connect and send data at the
same time, but it is the same as of broker mode.

Does anyone think this is useful?

Regards,
Nuno

2011/2/2 miniBill <cmt.minibill () gmail com>:
2011/2/2 Nuno Gonçalves <nunojpg () gmail com>:
Why the broker?

(sudo) ncat -kul 53 --sh-exec "minibill@89.16.178.89 \"ncat -u 8.8.8.8 53\""

Isn't this enough?

Regards,
Nuno

On Tue, Feb 1, 2011 at 15:01, miniBill <cmt.minibill () gmail com> wrote:
My ISP has filters on the dns.
Thanks to ncat I could bypass them.

ncat -l -k -u -p 53 --sh-exec "ncat localhost 1100" 2> /dev/null
ncat --broker -l -k -p 1100
ncat localhost 1100 --sh-exec "ssh minibill@89.16.178.89 \"ncat -u 8.8.8.8 53\""
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/



That command would open a ssh connection for every dns request,
which is something I want to avoid, as ssh connection takes ~1.5 seconds

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/

Current thread: