Penetration Testing mailing list archives

Re: By passing surf control


From: <dotnetter () bellsouth net>
Date: Wed, 25 Feb 2004 17:18:59 -0500

You can use ssh port forwarding  to by pass web content fileter.  What i did was set a machine up at home to listen for 
ssh on port 443.  Then i would create a ssh port forward to localhost:1000 set my browser to use a proxy at localhost 
1000 and bame all my traffic ssh encrypted went out over 443 and no more content filtering.  The cool thing was since 
logged 443 traffic is usually encrypted anyway no red flags.

Let me know if you want more info,
Bill Moore

From: Kudakwashe Chafa-Govha <KChafa-Govha () bankunitedfla com>
Date: 2004/02/25 Wed PM 04:04:22 EST
To: "'pen-test () securityfocus com'" <pen-test () securityfocus com>
Subject: By passing surf control

Hello Group,


Does anyone have any information on how to by pass a web content filter? We
use Surf Control to monitor and filter web content. However, I have one of
my users who was able to by pass this. We tried using a proxy to by pass
just for testing purposes but it did not work. I am still trying to figure
out what other method he used to do so. If anyone has any information , it
will be greatly appreciated.

Thanks

Kuda

**************************************************************************************************
The contents of this email and any attachments are confidential.
It is intended for the named recipient(s) only.
If you have received this email in error please notify the system manager or the 
sender immediately. Unless you are the intended recipient or his/her representative 
you are not authorized to, and must not, read, copy, distribute, use or retain this 
message or any part of it. 
**************************************************************************************************


---------------------------------------------------------------------------
----------------------------------------------------------------------------




---------------------------------------------------------------------------
----------------------------------------------------------------------------


Current thread: