Hello Crest, How about dnscat shell?
It's a DNS tunnel shell, maybe help to pass through firewall, proxy and others... http://www.skullsecurity.org/blog/2010/weaponizing-dnscat-with-shellcode-and-metasploit my two cents, Ulisses On Sun, Jan 9, 2011 at 5:10 PM, Crest Johanson <[email protected]> wrote: > Hello all, > > I'm studying attack vectors against the company I work for. Some metasploit > attacks work however, the proxy doesn't let the reverse connection through. > I tried to set the listening port to a port that the proxy allows > connections to, but it seems like the payload doesn't initiate the > connection through the proxy. > Is there away to point the payload to the proxy and from the proxy to the > attacker server? > > For browser autopwn, the framework set listeners on ports > 3333,4444,6666,7777 for different exploits, is there a way to change these > ports (maybe from source)? > > Thanks, > > > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com > _______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
