Security Basics mailing list archives
Re: Tunnel any protocol over any protocol?
From: Aarón Mizrachi <unmanarc () gmail com>
Date: Wed, 6 May 2009 03:54:16 -0430
On Martes 05 Mayo 2009 06:37:18 Chip Panarchy escribió:
Hello Is it possible to Tunnel any Protocol (within reason) over any other protocol? Eg; http tunnel, https tunnel, ftp tunnel, ssh tunnel etc. If yes, could you please tell me your preferred programs/tools/scripts for doing so?
Short LOGIC Answer: NO. The right logic answer is: You can tunnel any protocol over well defined group of protocols who admit two-way interchange of data in their definition and who flood control are disabled. How? Commonly vpn's that can work over several protocols. And VPN can tunnel any protocol. ------------------------------------------------------------------------------------------- Some examples of carriers: 0. TCP+SSL: Openvpn 1. UDP+SSL: Openvpn 2. Socks Proxy: Openvpn 3. HTTP Proxy: Openvpn 4. DNS: Iodine/NSTX 5. ICMP: ICMPTX 6. etc... -------------------------- Other carrier protocols who may work (Remember: Flooding control must be disabled): - Any IM protocol (AIM/Yahoo/MSN/IRC/etc) - SMTP/POP3 (Will be very slow) - HTTP - Etc.. -------------------------- Other examples of protocols/mechanism that can not act as carrier be definition: - Chargen protocol - Tempest and a SW radio ;-) only one-way, but could be two-way if an interpeter are installed on both machines, and both machines have a sw radio attached to line-in. - etc
Thanks in advance, Panarchy ------------------------------------------------------------------------ This list is sponsored by: InfoSec Institute Learn all of the latest penetration testing techniques in InfoSec Institute's Ethical Hacking class. Totally hands-on course with evening Capture The Flag (CTF) exercises, Certified Ethical Hacker and Certified Penetration Tester exams, taught by an expert with years of real pen testing experience. http://www.infosecinstitute.com/courses/ethical_hacking_training.html ------------------------------------------------------------------------
------------------------------------------------------------------------ This list is sponsored by: InfoSec Institute Learn all of the latest penetration testing techniques in InfoSec Institute's Ethical Hacking class. Totally hands-on course with evening Capture The Flag (CTF) exercises, Certified Ethical Hacker and Certified Penetration Tester exams, taught by an expert with years of real pen testing experience. http://www.infosecinstitute.com/courses/ethical_hacking_training.html ------------------------------------------------------------------------
Current thread:
- Tunnel any protocol over any protocol? Chip Panarchy (May 05)
- RE: Tunnel any protocol over any protocol? Danny Puckett (May 05)
- RE: Tunnel any protocol over any protocol? Jeff Johnson (May 06)
- Re: Tunnel any protocol over any protocol? Phil Bieber (May 06)
- RE: Tunnel any protocol over any protocol? Ken Kousky (May 06)
- RE: Tunnel any protocol over any protocol? Jeff Johnson (May 06)
- Re: Tunnel any protocol over any protocol? Brad Edmondson (May 05)
- Re: Tunnel any protocol over any protocol? Kurt Buff (May 06)
- Re: Tunnel any protocol over any protocol? Robin Wood (May 06)
- RE: Tunnel any protocol over any protocol? Murda Mcloud (May 06)
- Re: Tunnel any protocol over any protocol? Aarón Mizrachi (May 06)
- Re: Tunnel any protocol over any protocol? Muhammad Farooq-i-Azam (May 11)
- <Possible follow-ups>
- Re: Tunnel any protocol over any protocol? Nick Owen (May 05)
- Re: Tunnel any protocol over any protocol? v3nd3rs5uck (May 11)
- RE: Tunnel any protocol over any protocol? Danny Puckett (May 05)