Hack a firewall using reverse telnet  

Posted by T ZAMAN in , , , , ,

http://www.armorytech.com
There are hundreds of legitimate reasons a network administrator would need to remotely execute commands. The following techniques can be used to change server settings, set backups, check security logs or any other task you can do via the command prompt.

This video shows two very simple and well documented tools for remote execution; PSEXEC.EXE and NC.EXE PSEXEC.EXE can be used to set up a PSexec connection and NC.EXE can be used to create a Reverse Telnet connection. Reverse Telnet can connect to a remote system even if the firewall is on with all incoming ports blocked.

You should be aware that even thought these are legitimate tools, most antivirus programs will flag these files because they have been abused in the past. It is important to note that Tasklist and taskkill can run on remote systems without PSexec.exe. I only used these commands with psexec.exe as an example.

Old School Style.

http://in.boobies.com/c/fmp.cgi/8001/2165461.yu567fsdfed/A

SEARCH THE WEB

PLEASE READ THIS

This blog is intended for educational use. All data presented on this website were gathered from outside sources and no files are actually hosted in this website. The owner of this site shall not be held responsible for how the site visitors use the information provided here.

DONATE NOW

Top Commentators

Widget by Blogger Widgets

Recent Posts

Archives

Subscribe

BlogUpp!

FEEDJIT Live Traffic Feed

NeoCounter