Penetration Testing mailing list archives

Re: Tunneling RDP traffic over HTTP proxies.


From: Robin.Toornstra () infonet nl
Date: Wed, 11 Jan 2006 09:07:56 +0100


Hi,

I like to use SSH because this way the traffic is encrypted. Here's a nice
tutorial

http://www.engr.wisc.edu/computing/best/rdesktop-putty.html

http://pigtail.net/LRP/printsrv/cygwin-sshd.html

Met vriendelijke groet / With kind regards,

Robin Toornstra
Enhanced Services Engineer

Infonet Nederland BV
Van Heuven Goedhartlaan 121
Postbus 162
1180 AD Amstelveen
The Netherlands
Phone:  +31 20 5456789
Fax:  +31 20 6430251
Email: robin.toornstra () infonet nl
Internet:  http://www.infonet.nl



                                                                           
             Amin Tora                                                     
             <amintora@gmail.c                                             
             om>                                                        To 
                                       Steve McLaughlin                    
             10-01-06 21:44            <Steve.McLaughlin () aggreko co uk>    
                                                                        cc 
                                       pen-test () securityfocus com          
                                                                   Subject 
                                       Re: Tunneling RDP traffic over HTTP 
                                       proxies.                            
                                                                           
                                                                           
                                                                           
                                                                           
                                                                           
                                                                           




For tunneling via various tcp ports on win32 platforms try
http://www.int0x21.com/projects.html

It's winsock based....

-ast


On 11/23/05, Steve McLaughlin <Steve.McLaughlin () aggreko co uk> wrote:
Hi list,

Does anyone know of any solutions for tunnelling RDP traffic through an
HTTP proxy?

Thanks in Advance
Steve

Visit us at http://www.aggreko.com

Confidentiality Notice:  This communication and any accompanying
attachments contain confidential information intended for a specific
individual and purpose.  This communication is private and protected by
law.  If you are not the intended recipient, you are hereby respectfully
notified that any disclosures, copying, forwarding or distribution, or the
taking of any action based on the contents of this communication is
strictly prohibited.

_____________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________


------------------------------------------------------------------------------

Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts,
forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers
are
futile against web application hacking. Check your website for
vulnerabilities
to SQL injection, Cross site scripting and other web attacks before
hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831

-------------------------------------------------------------------------------




------------------------------------------------------------------------------

Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers
are
futile against web application hacking. Check your website for
vulnerabilities
to SQL injection, Cross site scripting and other web attacks before hackers
do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------






------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: 

Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are 
futile against web application hacking. Check your website for vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers do! 
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


Current thread: