On 11 April 2011 00:58, Mike Patterson <[email protected]> wrote: > On 11-04-10 6:50 PM, Robin Wood wrote: >> I was having a look at stunnel today and I've been wondering about >> pen-testing use cases for it. I asked on twitter and got a few >> comments about using it for encrypted data exfiltration but I don't >> see the point, if you are on a box with stunnel then it probably also >> has ssh/scp so just use that. > > Probably, but you never know. Mine was one of the comments, btw. :) And > you didn't stipulate that it was already present. :P > >> Are there any other good use cases? Places where there isn't already >> an easily available an encrypted tool that will do the same job. > > It sounds like you've got a tool and you're looking for a place to use > it. Why waste your time?
I'm trying to work out if it is a waste of time to learn it in depth or if there are some good situations where it is worth understanding it. What I'm wondering is is there a killer use for it that I really should know about and know how to use and setup or is it just a tool that is worth knowing it exists and has a man page and leave it at that. I'm going to look at using it for man-in-the-middle as I like that idea. Robin > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com > _______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
