You may want to look into something like EgressBuster from TrustedSec (David Kennedy), written in Python. https://www.trustedsec.com/july-2012/egress-buster-reverse-bypassav/ Or FireBuster, which is written in PowerShell. http://roo7break.co.uk/?p=758 Both will attempt to brute force their way, port-by-port, until they find a way out of the network (very noisy!)
I don't think these tools natively play very nicely with internal proxies, so you may want to experiment with some WPAD-fu if that's in your environment. Thankfully SpiderLabs has a great tool for catching those clear text passwords via MITM. https://www.trustedsec.com/july-2013/wpad-man-in-the-middle-clear-text-passwords/ On Mon, Dec 23, 2013 at 4:42 PM, Larry Petty <[email protected]> wrote: > I'm looking for a better way to get my Mac mini's and Window's machines to > call home when I ship them to a client. I would like a solution that tries > various outbound ports if the first fails. > > I'm currently using OpenVPN. This generally works, but won't check > another port if 443 falls. > > Do you know of a solution for each OS? Maybe a script that does a reverse > shell on a list of ports? > > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com >
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
