O'Reilly logo

BackTrack 4: Assuring Security by Penetration Testing by Shakeel Ali, Tedi Heriyanto

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we discussed the protocol tunneling tools that can wrap one network protocol to the other. The goal of this protocol tunneling is to bypass any mechanisms enacted by the target machine to limit our capabilities to connect to the outside world. The tools in this category are DNS2tcp, Ptunnel, and Stunnel4.

The next tools are proxies. They are used to separate the direct connection between one machine and the other machine. The tools in this category are 3proxy and proxychains.

End-to-end connections tools come next. Their purpose is to create a network connection between two machines so they can carry out a file transfer or run a command on the remote machine.

The main purpose of all of the tools in this chapter is that we ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required