February 29, 2012
New tool release - "Egress Buster" - Find outbound ports
Written by
David Kennedy
Penetration Testing
Security Testing & Analysis

egressbuster.exe
example: egressbuster.exe 208.1.1.1 1-1000
In the above example, we specify a low port range and high port range, egressbuster will attempt to connect from port 1 to 1000 outbound to wherever the reverse_listener is.
The listener:
python egress_listener.py
example: python egress_listener.py 1-1000
In the above example, we just specify what ranges we need to listen to. In the above example we listen from 1 to 1000 for incoming connections. When a connection is established, this is what you'll see on the listener side.
192.168.235.131 connected on port: 170
192.168.235.131 connected on port: 171
192.168.235.131 connected on port: 172
192.168.235.131 connected on port: 173
192.168.235.131 connected on port: 174
192.168.235.131 connected on port: 175
192.168.235.131 connected on port: 176
192.168.235.131 connected on port: 177
192.168.235.131 connected on port: 178
If your interested, download the byte compiled code and the python source here.