Hacking persistence with IPv6, Metasploit, Microsoft and Mubix!

This time on the show, Mubix joins us to add persistance to our penetration testing with a little Metasploit, Microsoft, and IP version 6.

As Mubix, aka Rob Fuller explains: Bind shells went to the wayside with the dawn of firewalls and NAT, but IPv6 was nice enough to bring them back. With the help of some built in tools from good old Redmond and our trusty Meterpreter, we can now connect to our shell any time we please. Based on his Revenge of the Bind Shell presentation we dive into the tools and techniques required to traverse firewalls and maintain persistence.