Back in February Dave Kennedy released a tool called Egress Buster
that would look for outbound ports and let you know what egress rules
were in place behind a firewall. The way this initially worked was by
sending TCP packets on each and every port originating from inside the
firewall to an externally facing server that was listening on those
ports. Today we would like to announce the release of the Egress Buster
Reverse Shell which will scan for open ports on the internal network and
once an open port has been established, spawn a reverse shell.
Benchmark testing showed about a 1,000 ports were tested in under five
seconds.
https://www.trustedsec.com/july-2012/egress-buster-reverse-bypassav/
Sabtu, 14 Juli 2012
Egress Buster Reverse Shell and Bypassing AV
Langganan:
Posting Komentar (Atom)
0 komentar:
Posting Komentar