dns2tcp: Connection to remote ssl-tunnel

0 votes
How can I create a line based connection to a remote ssl-tunnel host using dns2tcp?
May 21 in Cyber Security & Ethical Hacking by John
20 views

1 answer to this question.

0 votes

This command will create a line-based connection:

$ dns2tcpc -r ssl-tunnel -l 4430 -k <my-key> -z dns2tcp._hsc.fr <dns_server>
answered May 21 by Rajan

Related Questions In Cyber Security & Ethical Hacking

0 votes
1 answer

Not able to install arpspoof

There is no package called arpspoof. To use the arpspoof command, ...READ MORE

answered Feb 9 in Cyber Security & Ethical Hacking by Omkar
• 67,290 points
147 views
0 votes
1 answer

How to find IP address of nodes in my network?

The IP address of the nodes connected ...READ MORE

answered Feb 9 in Cyber Security & Ethical Hacking by Omkar
• 67,290 points
38 views
0 votes
1 answer

How to find MAC address using IP address?

To find the MAC address, run this ...READ MORE

answered Feb 9 in Cyber Security & Ethical Hacking by Omkar
• 67,290 points
63 views
0 votes
1 answer

How to attack RSA algorithm?

There are different approaches used to attack ...READ MORE

answered Feb 12 in Cyber Security & Ethical Hacking by Omkar
• 67,290 points
51 views
0 votes
1 answer

Not able to use nmap in python.

nmap module doesn’t have PortScanner attribute. The ...READ MORE

answered Jan 28 in Cyber Security & Ethical Hacking by Omkar
• 67,290 points
59 views
0 votes
1 answer

python nmap can't find PortScanner attribute

As I can see in the error ...READ MORE

answered Jan 30 in Python by Omkar
• 67,290 points
372 views
0 votes
1 answer

Not able to run nmap scan on router.

Might not be the actual router address. ...READ MORE

answered Jan 31 in Cyber Security & Ethical Hacking by Omkar
• 67,290 points
68 views
0 votes
1 answer

SIOCSIFFLAGS: Operation not permitted

You need sudo permissions to make changes to ...READ MORE

answered Feb 6 in Cyber Security & Ethical Hacking by Omkar
• 67,290 points
111 views
0 votes
1 answer

dns2tcp: Get all available connections

You can get the list of available ...READ MORE

answered May 21 in Cyber Security & Ethical Hacking by Jishan
25 views