-----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Mark C. Ballew Sent: Wednesday, August 06, 2003 6:02 PM To: [EMAIL PROTECTED] Subject: Re: [RLUG] Just Call Me Script Daddy
On Thu, 2003-08-07 at 00:03, Robinson, Eric R. wrote: > I am using this fun little experiment to demonstrate to folks here at > NDOT how a simple executable could be used to bypass our firewall and > give a remote intruder real-time access to the NDOT network. > I guess this officially makes me a script kiddy, although I am 42, so > perhaps script �daddy� would be more accurate. :-) > > Of course, this sort of thing will be old hat to many of you. Does > anyone else in the list do this kind of experimentation? It would be > fun to compare notes. Script Daddy, The DRI.edu network uses a proxy to route all port 80 and 443 traffic to the net, so there is no way to access the internal machines or the internal machines to access external machines, except to have the proxy to do the request. This would be a good way to prevent reverse exploits to the NDOT network, at the annoyance of using a proxy. If anyone knows a way around this proxy situation, or how to do reverse connections using a proxy, I'd be quite interested. Mark -- Mark C. Ballew <[EMAIL PROTECTED]> Sublinear.net _______________________________________________ RLUG mailing list [EMAIL PROTECTED] http://www.rlug.org/mailman/listinfo/rlug _______________________________________________ RLUG mailing list [EMAIL PROTECTED] http://www.rlug.org/mailman/listinfo/rlug
