You may want to look into something like EgressBuster from TrustedSec
(David Kennedy), written in Python.
https://www.trustedsec.com/july-2012/egress-buster-reverse-bypassav/
Or FireBuster, which is written in PowerShell. http://roo7break.co.uk/?p=758
Both will attempt to brute force their way, port-by-port, until they find a
way out of the network (very noisy!)

I don't think these tools natively play very nicely with internal proxies,
so you may want to experiment with some WPAD-fu if that's in your
environment. Thankfully SpiderLabs has a great tool for catching those
clear text passwords via MITM.
https://www.trustedsec.com/july-2013/wpad-man-in-the-middle-clear-text-passwords/


On Mon, Dec 23, 2013 at 4:42 PM, Larry Petty <[email protected]> wrote:

> I'm looking for a better way to get my Mac mini's and Window's machines to
> call home when I ship them to a client. I would like a solution that tries
> various outbound ports if the first fails.
>
> I'm currently using OpenVPN. This generally works,  but won't check
> another port if 443 falls.
>
> Do you know of a solution for each OS? Maybe a script that does a reverse
> shell on a list of ports?
>
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
>
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to