[tags]egress,emails,ports,scanner[/tags]
[short_descr]Check egress filtering and identify if ports are allowed to automatically spawn a shell.[/short_descr]
[link] https://github.com/trustedsec/egressbuster [/link]
[long_descr]
EgressBuster is a way to test the effectiveness of egress filtering for an individual area. When performing a penetration test, often times companies leverage egress filtering in order to prevent access to the outside Internet. Most companies have special exceptions and allow ports but they may be difficult to find.
There are two components to EgressBuster:
egressbuster<.py><.exe> - the egressbuster.py or egressbuster.exe can be run in Linux/OSX/Windows(EXE). This will check outbound ports to a location where you have egress_listener.py. Run this on the victim machine you want to check the ports on. You can also spawn an automatic command shell once a port is detected.
[tags]egress,emails,ports,scanner[/tags] [short_descr]Check egress filtering and identify if ports are allowed to automatically spawn a shell.[/short_descr] [link] https://github.com/trustedsec/egressbuster [/link] [long_descr] EgressBuster is a way to test the effectiveness of egress filtering for an individual area. When performing a penetration test, often times companies leverage egress filtering in order to prevent access to the outside Internet. Most companies have special exceptions and allow ports but they may be difficult to find.
There are two components to EgressBuster: