On 11 April 2011 00:58, Mike Patterson <[email protected]> wrote:
> On 11-04-10 6:50 PM, Robin Wood wrote:
>> I was having a look at stunnel today and I've been wondering about
>> pen-testing use cases for it. I asked on twitter and got a few
>> comments about using it for encrypted data exfiltration but I don't
>> see the point, if you are on a box with stunnel then it probably also
>> has ssh/scp so just use that.
>
> Probably, but you never know. Mine was one of the comments, btw. :) And
> you didn't stipulate that it was already present. :P
>
>> Are there any other good use cases? Places where there isn't already
>> an easily available an encrypted tool that will do the same job.
>
> It sounds like you've got a tool and you're looking for a place to use
> it. Why waste your time?

I'm trying to work out if it is a waste of time to learn it in depth
or if there are some good situations where it is worth understanding
it.

What I'm wondering is is there a killer use for it that I really
should know about and know how to use and setup or is it just a tool
that is worth knowing it exists and has a man page and leave it at
that.

I'm going to look at using it for man-in-the-middle as I like that idea.

Robin

> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
>
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to