Figure 313 Transport Redirection

Attacker

Attacker

Opinai Tfafiic: ^ Source: Atracver

Opinai Tfafiic: ^ Source: Atracver

Compromised Host A

Effective Connectivity; Souroû: Atlacker □eslinalran: F3 Port: 23

H-edireded Traffic: SoufCû-: A

Deetaat&tt E

I Host B

In the figure, you can see that the attacker is running the transport redirection attack on a compromised host in the public server network. This host is redirecting queries (with Netcat) so that Telnet queries from the Internet are redirected to SSH queries to the internal network. In this way, the attacker is able to take advantage of an existing rule in the firewall to send traffic the firewall administrator never intended to be sent.

100 SEO Tips

100 SEO Tips

100 SEO Tips EVERY SEO Enthusiast Should Know. This Report 100 SEO Tips will help you to Utilize These Tips to Dominate The Search Engine Today.

Get My Free Ebook


Post a comment