UBG Hacking Team
  • About UBG
  • Site Contributors
    • NanoByt3
    • Exabyte
    • DataMcdataface
  • CTF Writeups
    • HTB Traceback Walkthrough
    • HTB Magic Walkthrough
    • HTB Nest Walkthrough
    • HTB Monteverde Walkthrough
    • HTB Resolute Walkthrough
    • HTB Ellingson Walkthrough
    • HTB Jarvis Walkthrough
  • Blog Posts
    • Certification Reviews
      • PenTest+
      • GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
      • OSCP Guide to pass
      • SANS Guide to pass
      • CCSP Guide to pass
      • CISSP Guide to pass
      • OSWE Exam Blog
      • OSCP Exam Blog
      • CEH Exam Blog
    • Five Offensive Objectives
    • Powershell For Penetration Testers Downloading And Exfiltrating
    • Powershell For Penetration Testers Switching Users
    • Powershell For Penetration Testers Beating Restricted Policies
  • Attacks
    • WebHosting
      • IP's to block
    • Reconnaissance
      • C99 Recon
      • DNS
        • SubDomain lookup
      • Tools/Syntax
      • O365 RealmInfo
    • On-Prem Linux
      • Shell Upgrades
    • On-Prem Windows
      • Service Session Hijack
      • Egress Testing
  • Detection
  • MISC.
    • enable snmp office365
Powered by GitBook
On this page

Was this helpful?

  1. Attacks
  2. On-Prem Windows

Egress Testing

PreviousService Session HijackNextDetection

Last updated 4 years ago

Was this helpful?

nmap -T4 -PN allports.exposed
nmap -T4 -PN scanme.nmap.org

import SimpleHTTPServer
import SocketServer

PORT = 8000

class ServerHandler(SimpleHTTPServer.SimpleHTTPRequestHandler):

    def do_POST(self):
      content_len = int(self.headers.getheader('content-length', 0))
      post_body = self.rfile.read(content_len)
      print post_body

Handler = ServerHandler

httpd = SocketServer.TCPServer(("", PORT), Handler)

print "serving at port", PORT
httpd.serve_forever()
https://github.com/FortyNorthSecurity/Egress-Assess