On 4/2/06, Niklaus <[EMAIL PROTECTED]> wrote:
> > what problem are you really trying to solve?

really, what problem are you trying to solve? the fact that you have
untrusted users?

> I understand the tunnelling through ssh part.
> Can you explain what reverse telnet is . I don't get it.

assume have an http proxy listening on 127.0.0.1 on your machine.
assume you've disabled port forwarding in sshd_config so i can't
tunnel to my proxy.
i then change my proxy program to i connect back to a listener
(netcat?) on my remote machine at which point i have a tcp connection
through which i can forward my http requests to make them look like
they're coming from your box.

this sort of trick is easy to whack together... probably 10 or 15
minutes if you're ripping code straight out of "learning perl" without
knowing what you're doing. no doubt there's stuff in ports that can be
used too.

CK

--
GDB has a 'break' feature; why doesn't it have 'fix' too?

Reply via email to