Penetration Testing mailing list archives
Re: Penetration Test - PHP / APACHE
From: Bartek Krajnik <bartek () bmk-it com>
Date: Sat, 25 Mar 2006 20:50:00 +0100
On 24-03-2006 at 03:31:46PM +0100, Martin Mačok wrote:
On Thu, Mar 23, 2006 at 12:45:54PM -0000, larry () appsecurity com wrote:The only problem is that the database is conifgured with "localhost" so I cant connect with a database client remotely- ( Expected this in a DMZ )If the target is 'Weak ES Model' (probably it is, see RFC 1122 section 3.3.4.2) and you are on the same network segment then you could connect to localhost remotely. Something like this should do the trick: attacker# route del 127.0.0.1 attacker# route add 127.0.0.1 host gw <victim_ip> attacker# telnet 127.0.0.1 3306 ...
Only if wictim has weak model (accepts packet on different interfaces for their all IPs). Attacker can use ftp as proxy (look in google how to use it). HTH ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/forms/ec.php?pubid=10025 And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com ------------------------------------------------------------------------------
Current thread:
- Penetration Test - PHP / APACHE larry (Mar 23)
- Re: Penetration Test - PHP / APACHE Martin Mačok (Mar 24)
- Re: Penetration Test - PHP / APACHE Bartek Krajnik (Mar 25)
- Re: Penetration Test - PHP / APACHE Martin Mačok (Mar 24)