and if its LAN attack with bounce proxy ...will it be appear like it coming from WAN
General discussion of ethical hacking concepts, experiences, ideas and certs.
yatz wrote:Two things-
In a "bounce attack," you need to have access to an FTP site first. Basically you connect into an FTP server and then use that server to execute your brute force attack. A flaw in the FTP design allows arbitrary communication from one connection so you cannot be detected without the FTP server being traced first.
Secondly, this theoretically is the same as using netcat relays. Just set up a relay and then execute your brute force attack at the relay.
Does this make sense?
Users browsing this forum: No registered users and 3 guests