does everything go through this proxy? web proxy i assume? what about ftp
traffic? You can use that port (21) or any other that doesnt use the proxy
and instead just uses the def route through the firewall.


__________________________________
Albert R. Campa


On Sun, Jan 9, 2011 at 1:10 PM, Crest Johanson <[email protected]> wrote:

> Hello all,
>
> I'm studying attack vectors against the company I work for. Some metasploit
> attacks work however, the proxy doesn't let the reverse connection through.
> I tried to set the listening port to a port that the proxy allows
> connections to, but it seems like the payload doesn't initiate the
> connection through the proxy.
> Is there away to point the payload to the proxy and from the proxy to the
> attacker server?
>
> For browser autopwn, the framework set listeners on ports
> 3333,4444,6666,7777 for different exploits, is there a way to change these
> ports (maybe from source)?
>
> Thanks,
>
>
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
>
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to