From: Filip Maertens (filip@securax.be)
Date: Sat Mar 15 2003 - 17:57:32 EST
>have successfully tested it in a pen test stituation in the lab for
doing
>reverse connectivity. I think this would be a valuable tool for all
people
I beg to differ.
What exactly is different from using netcat listeners on both,
attack-client and target machine? All in all, using a reverse telnet
technique using netcat isn't very much a big an issue? I think this is
a handy tool, but I would like to emphasize one can also use netcat in
doing so (if this had been mentioned before in the "old posts",
disregard this post, since I didn't followed this thread).
Fil
-- Filip Maertens @ Home http://www.compsec.be ---------------------------------------------------------------------------- Did you know that you have VNC running on your network? Your hacker does. Plug your security holes now! Download a free 15-day trial of VAM: http://www2.stillsecure.com/download/sf_vuln_list.html
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:30 EDT