On Mon, 2005-08-08 at 13:40 +0400, Ahmad N wrote:
> I was trying to gain a reverse shell to a website the other day using 
> a buffer overflow exploit, unfortunaetly it seems like they have some
> kind of
> buffer overflow exploit protection coming from and IDS or IPS 

Or they just have the web server properly firewalled so that no outbound
connections from the web server are allowed to the outside. No
black-magic-IPS-fu required there.

Instead of using a reverse shell, either have the exploit crash the web
server and set up a listener on port 80 and use a forward shell, or
better yet, use an inline-shell that re-uses the already established
session you have with the web server.

HTH,
Frank


-- 
Ciscogate: Shame on Cisco. Double-Shame on ISS.

Attachment: signature.asc
Description: This is a digitally signed message part

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to