Penetration Testing mailing list archives

Re: [PEN-TEST] Deeper Penetration (fwd)


From: batz <batsy () VAPOUR NET>
Date: Wed, 15 Nov 2000 13:28:40 -0500

I forwarded this directly the poster, but I'll send it to the list anyway.
Note that it may not work with the TXT record, but it could be done
with netcat listening as a nameserver. It's probable that though
the firewall isn't allowing the NT server to initiate outbound
connections, it should be able to do dns lookups.

--
batz
Reluctant Ninja
Defective Technologies

---------- Forwarded message ----------
Date: Wed, 15 Nov 2000 08:27:45 -0500 (EST)
From: batz <batsy () vapour net>
To: thylacine () HUSHMAIL COM
Subject: Re: [PEN-TEST] Deeper Penetration

On Wed, 15 Nov 2000 thylacine () HUSHMAIL COM wrote:

:At this point I would like to install a keyboard capture program or perhaps
:VNC. Problem is, the system is firewalled and I can't get the server to
:download any tools. Suggestions anyone.

I haven't tested this on NT so I don't know if it would work.
However, if you want to get tools onto the machine, get a
tarball of the tool you want to run, set up a nameserver
somewhere on the net.

UUEncode the tarball of your tool and create a TXT record with
the UUencoded file as the contents of the record.

Do an nslookup on the nameserver from the compromised machine for
the record in question, and redirect it to a file.

uudecode the file, and install your tool.


--EOT--


Current thread: