Penetration Testing mailing list archives
Re: [PEN-TEST] Deeper Penetration (fwd)
From: batz <batsy () VAPOUR NET>
Date: Wed, 15 Nov 2000 13:28:40 -0500
I forwarded this directly the poster, but I'll send it to the list anyway. Note that it may not work with the TXT record, but it could be done with netcat listening as a nameserver. It's probable that though the firewall isn't allowing the NT server to initiate outbound connections, it should be able to do dns lookups. -- batz Reluctant Ninja Defective Technologies ---------- Forwarded message ---------- Date: Wed, 15 Nov 2000 08:27:45 -0500 (EST) From: batz <batsy () vapour net> To: thylacine () HUSHMAIL COM Subject: Re: [PEN-TEST] Deeper Penetration On Wed, 15 Nov 2000 thylacine () HUSHMAIL COM wrote: :At this point I would like to install a keyboard capture program or perhaps :VNC. Problem is, the system is firewalled and I can't get the server to :download any tools. Suggestions anyone. I haven't tested this on NT so I don't know if it would work. However, if you want to get tools onto the machine, get a tarball of the tool you want to run, set up a nameserver somewhere on the net. UUEncode the tarball of your tool and create a TXT record with the UUencoded file as the contents of the record. Do an nslookup on the nameserver from the compromised machine for the record in question, and redirect it to a file. uudecode the file, and install your tool. --EOT--
Current thread:
- Re: [PEN-TEST] Deeper Penetration (fwd) batz (Nov 16)