PaulDotCom mailing list archives
Re: Reverse shell script
From: xgermx <xgermx () gmail com>
Date: Fri, 27 Dec 2013 11:56:37 -0600
You may want to look into something like EgressBuster from TrustedSec (David Kennedy), written in Python. https://www.trustedsec.com/july-2012/egress-buster-reverse-bypassav/ Or FireBuster, which is written in PowerShell. http://roo7break.co.uk/?p=758 Both will attempt to brute force their way, port-by-port, until they find a way out of the network (very noisy!) I don't think these tools natively play very nicely with internal proxies, so you may want to experiment with some WPAD-fu if that's in your environment. Thankfully SpiderLabs has a great tool for catching those clear text passwords via MITM. https://www.trustedsec.com/july-2013/wpad-man-in-the-middle-clear-text-passwords/ On Mon, Dec 23, 2013 at 4:42 PM, Larry Petty <lspetty () gmail com> wrote:
I'm looking for a better way to get my Mac mini's and Window's machines to call home when I ship them to a client. I would like a solution that tries various outbound ports if the first fails. I'm currently using OpenVPN. This generally works, but won't check another port if 443 falls. Do you know of a solution for each OS? Maybe a script that does a reverse shell on a list of ports? _______________________________________________ Pauldotcom mailing list Pauldotcom () mail pauldotcom com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
_______________________________________________ Pauldotcom mailing list Pauldotcom () mail pauldotcom com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
Current thread:
- Reverse shell script Larry Petty (Dec 27)
- Re: Reverse shell script xgermx (Dec 29)