nat tested

This commit is contained in:
bmantra
2012-07-23 20:26:38 +02:00
2 changed files with 7 additions and 3 deletions

View File

@@ -19,7 +19,11 @@ beef:
enable: true
category: "Network"
name: "IRC NAT Pinning"
<<<<<<< HEAD
description: "Attempts to open closed ports on statefull firewalls and attempts to create pinholes on NAT-devices. The firewall/NAT-device must support IRC connection tracking. BeEF will automatically bind a socket on port 6667 (IRC). Then you can connect to the victims public IP on that port. For more information, please refer to: <a href='http://samy.pl/natpin/'>http://samy.pl/natpin/</a> ."
=======
description: "Attempts to open closed ports on statefull firewalls and attempts to create pinholes on NAT-devices. The firewall/NAT-device must support IRC connection tracking. On the attackers side the TCP connection just needs to be accepted (nc -l -p 6667). Then you can connect to the victims public IP on that port. For more information, please refer to: <a href='http://samy.pl/natpin/'>http://samy.pl/natpin/</a> ."
>>>>>>> 5a2b29bab46a04c1062119fcff43be416d4fac00
authors: ["Bart Leppens"]
target:
working: ["FF"]

View File

@@ -15,9 +15,9 @@
#
class Irc_nat_pinning < BeEF::Core::Command
def pre_send
BeEF::Core::NetworkStack::Handlers::AssetHandler.instance.bind_socket("IRC", "0.0.0.0", 6667)
end
#def pre_send
# BeEF::Core::NetworkStack::Handlers::AssetHandler.instance.bind_socket("IRC", "0.0.0.0", 6667)
#end
def self.options
return [