Penetration Testing mailing list archives
Re: Sniff telnet connections
From: carlopmart <carlopmart () gmail com>
Date: Fri, 05 May 2006 10:59:53 +0200
Many thanks to all for your responses, but I need to clarify some points. a) Host to audit is an AS400b) I can not use dns cache poisoning technique because this host doesn't have hostname associated with an ip. Telnet is executed directly to host ip.
c) I need to audit this host over Internet (that in previous message I say).I think that the only technique that I can use is "man in middle", but I don't know which source ips can access this host. I don't have physical access to this host or lan that stay.
How can I accomplish this task? one () two com wrote:
You may be able to perform DNS cache poisoning forcing them to connect to your machine over the internet instead of their target host - assuming that they are resolving the hostname they are connecting to. More than likely though you will need to compromise a box on the remote network and capture with something like dsniff or Cain&Abel. Cheers, One2 ------------------------------------------------------------------------------ This List Sponsored by: CenzicConcerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.------------------------------------------------------------------------------
-- CL Martinez carlopmart {at} gmail {d0t} com ------------------------------------------------------------------------------ This List Sponsored by: CenzicConcerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------
Current thread:
- Re: Sniff telnet connections, (continued)
- Re: Sniff telnet connections Jorge Alfredo Garcia (May 04)
- Re: Sniff telnet connections Brooks Garrett (May 07)
- Re: Sniff telnet connections Gareth Davies (May 04)
- Re: Sniff telnet connections Max (May 07)
- RE: Sniff telnet connections Jarmon, Don R (May 04)
- RE: Sniff telnet connections Dan Catalin Vasile (May 07)
- RE: Sniff telnet connections Lars Troen (May 04)
- Re: Sniff telnet connections Krugger (May 04)
- RE: Sniff telnet connections Damien Dinh (May 04)
- RE: Sniff telnet connections one (May 04)
- Re: Sniff telnet connections carlopmart (May 07)
- Re: Sniff telnet connections Tim (May 07)
- Re: Sniff telnet connections Alvin Oga (May 07)
- Re: Sniff telnet connections Tim (May 08)
- Re: Sniff telnet connections carlopmart (May 07)
- Re: Sniff telnet connections Jorge Alfredo Garcia (May 04)
- RE: Sniff telnet connections Randy Henke (May 07)