does everything go through this proxy? web proxy i assume? what about ftp traffic? You can use that port (21) or any other that doesnt use the proxy and instead just uses the def route through the firewall.
__________________________________ Albert R. Campa On Sun, Jan 9, 2011 at 1:10 PM, Crest Johanson <[email protected]> wrote: > Hello all, > > I'm studying attack vectors against the company I work for. Some metasploit > attacks work however, the proxy doesn't let the reverse connection through. > I tried to set the listening port to a port that the proxy allows > connections to, but it seems like the payload doesn't initiate the > connection through the proxy. > Is there away to point the payload to the proxy and from the proxy to the > attacker server? > > For browser autopwn, the framework set listeners on ports > 3333,4444,6666,7777 for different exploits, is there a way to change these > ports (maybe from source)? > > Thanks, > > > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com >
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
