1 | Think of it as a telnet over ICMP (ping): gives the ability to tunnel shell sessions over ICMP or UDP port 53 (looks like DNS) |
2 | Offers a command line shell to the attacker on the victim machine |
3 | Works in a client-server model; first server must be installed on the victim's machine |
4 | http://www.phrack.com/Archives/phrack51.tgz |
5 | Defense: know what should be running on your system |