Home page logo
/

pauldotcom logo PaulDotCom mailing list archives

Re: Reverse shell script
From: xgermx <xgermx () gmail com>
Date: Fri, 27 Dec 2013 11:56:37 -0600

You may want to look into something like EgressBuster from TrustedSec
(David Kennedy), written in Python.
https://www.trustedsec.com/july-2012/egress-buster-reverse-bypassav/
Or FireBuster, which is written in PowerShell. http://roo7break.co.uk/?p=758
Both will attempt to brute force their way, port-by-port, until they find a
way out of the network (very noisy!)

I don't think these tools natively play very nicely with internal proxies,
so you may want to experiment with some WPAD-fu if that's in your
environment. Thankfully SpiderLabs has a great tool for catching those
clear text passwords via MITM.
https://www.trustedsec.com/july-2013/wpad-man-in-the-middle-clear-text-passwords/


On Mon, Dec 23, 2013 at 4:42 PM, Larry Petty <lspetty () gmail com> wrote:

I'm looking for a better way to get my Mac mini's and Window's machines to
call home when I ship them to a client. I would like a solution that tries
various outbound ports if the first fails.

I'm currently using OpenVPN. This generally works,  but won't check
another port if 443 falls.

Do you know of a solution for each OS? Maybe a script that does a reverse
shell on a list of ports?

_______________________________________________
Pauldotcom mailing list
Pauldotcom () mail pauldotcom com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

_______________________________________________
Pauldotcom mailing list
Pauldotcom () mail pauldotcom com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]