I tried that already. The reverse connection doesn't make it to the attacker server.
________________________________ From: Bill Swearingen <[email protected]> To: PaulDotCom Security Weekly Mailing List <[email protected]> Sent: Mon, January 10, 2011 4:34:03 AM Subject: Re: [Pauldotcom] metasploit gurus Dont use autopwn, try a reverse meterpreter shell on a port that is likely to bypass the proxy & get out (443, 22, 80, etc) On Sun, Jan 9, 2011 at 1:10 PM, Crest Johanson <[email protected]> wrote: Hello all, > >I'm studying attack vectors against the company I work for. Some metasploit >attacks work however, the proxy doesn't let the reverse connection through. I >tried to set the listening port to a port that the proxy allows connections >to, >but it seems like the payload doesn't initiate the connection through the >proxy. > >Is there away to point the payload to the proxy and from the proxy to the >attacker server? > >For browser autopwn, the framework set listeners on ports 3333,4444,6666,7777 >for different exploits, is there a way to change these ports (maybe from >source)? > > >Thanks, > > >_______________________________________________ >Pauldotcom mailing list >[email protected] >http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom >Main Web Site: http://pauldotcom.com >
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
