Penetration Testing mailing list archives

RE: Tool to find hidden web proxy server


From: "Aditya Deshmukh" <aditya.deshmukh () online gateway technolabs net>
Date: Fri, 3 Sep 2004 10:11:13 +0530

ALD >  I hope, I am able to clearly define my question. Thanks

now everything stands in a very different light... what is the os where the proxy server is installed? if the os is win 
NT /2k /xp then there is event loging which would have caught who did this if it was enabled. if it is linux / solaris 
/ unix then look at the system logs or syslog messages for this activity 

you could setup auth of some kind for internet access rather than just using ip address verification, radius, nt dom, 
active directory, ldap all come to mind for this.... depends upon what you are using ...

 i can make only assumption untill you can tell more about your network configration... if there is any sensitive do 
mail me off list as this is a public list and archieved on the internet for a very long time ...



-aditya




________________________________________________________________________
Delivered using the Free Personal Edition of Mailtraq (www.mailtraq.com)

------------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Check out our Advanced Hacking course,
learn to write exploits and attack security infrastructure. Attend a course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.

http://www.infosecinstitute.com/courses/ethical_hacking_training.html
-------------------------------------------------------------------------------


Current thread: