>have successfully tested it in a pen test stituation in the lab for doing >reverse connectivity. I think this would be a valuable tool for all people I beg to differ. What exactly is different from using netcat listeners on both, attack-client and target machine? All in all, using a reverse telnet technique using netcat isn't very much a big an issue? I think this is a handy tool, but I would like to emphasize one can also use netcat in doing so (if this had been mentioned before in the "old posts", disregard this post, since I didn't followed this thread). Fil -- Filip Maertens @ Home http://www.compsec.be ---------------------------------------------------------------------------- Did you know that you have VNC running on your network? Your hacker does. Plug your security holes now! Download a free 15-day trial of VAM: http://www2.stillsecure.com/download/sf_vuln_list.html
This archive was generated by hypermail 2b30 : Sun Mar 16 2003 - 09:41:41 PST