Security Basics mailing list archives

Re: Tunnel any protocol over any protocol?


From: Aarón Mizrachi <unmanarc () gmail com>
Date: Wed, 6 May 2009 03:54:16 -0430

On Martes 05 Mayo 2009 06:37:18 Chip Panarchy escribió:
Hello

Is it possible to Tunnel any Protocol (within reason) over any other
protocol?

Eg; http tunnel, https tunnel, ftp tunnel, ssh tunnel etc.

If yes, could you please tell me your preferred programs/tools/scripts
for doing so?

Short LOGIC Answer: NO.

The right logic answer is: You can tunnel any protocol over well defined group 
of protocols who admit two-way interchange of data in their definition and who 
flood control are disabled.

How? Commonly vpn's that can work over several protocols. And VPN can tunnel 
any protocol.

-------------------------------------------------------------------------------------------
Some examples of carriers:

0. TCP+SSL: Openvpn
1. UDP+SSL: Openvpn
2. Socks Proxy: Openvpn
3. HTTP Proxy: Openvpn
4. DNS: Iodine/NSTX
5. ICMP: ICMPTX
6. etc...

--------------------------
Other carrier protocols who may work (Remember: Flooding control must be 
disabled):

- Any IM protocol (AIM/Yahoo/MSN/IRC/etc)
- SMTP/POP3 (Will be very slow)
- HTTP
- Etc..

--------------------------
Other examples of protocols/mechanism that can not act as carrier be 
definition:

- Chargen protocol
- Tempest and a SW radio ;-) only one-way, but could be two-way if an 
interpeter are installed on both machines, and both machines have a sw radio 
attached to line-in.
- etc



Thanks in advance,

Panarchy

------------------------------------------------------------------------
This list is sponsored by: InfoSec Institute

Learn all of the latest penetration testing techniques in InfoSec
Institute's Ethical Hacking class. Totally hands-on course with evening
Capture The Flag (CTF) exercises, Certified Ethical Hacker and Certified
Penetration Tester exams, taught by an expert with years of real pen
testing experience.

http://www.infosecinstitute.com/courses/ethical_hacking_training.html
------------------------------------------------------------------------


------------------------------------------------------------------------
This list is sponsored by: InfoSec Institute

Learn all of the latest penetration testing techniques in InfoSec Institute's Ethical Hacking class.
Totally hands-on course with evening Capture The Flag (CTF) exercises, Certified Ethical Hacker and Certified 
Penetration Tester exams, taught by an expert with years of real pen testing experience.

http://www.infosecinstitute.com/courses/ethical_hacking_training.html
------------------------------------------------------------------------


Current thread: