Penetration Testing mailing list archives
Re: bypassing employer's proxy to surf anonymously
From: Karyn Pichnarczyk <karyn () sandstorm net>
Date: Tue, 13 Jun 2006 12:49:22 -0400
Gimeshell, If a network is being used to transfer traffic, and something is physically monitoring all traffic (regardless of source/destination port, regardless of protocol, etc) then there's no way to prevent them from monitoring your traffic over that network. You're talking about bypassing something in a lower network layer (physical) with something in a higher network layer (i.e. Data or Network). It's not going to happen. Now hiding data in unsuspicious packets....depends on your definition of "unsuspicious" and the level of detail of the network admins are who are monitoring the traffic. If the net admins are using a network forensics analysis product you have to get fairly creative to hide your data. karyn gimeshell () web de wrote:
Question: Is there a solution to prevent proxy traffic monitor (and therewith big brother) to see SSH traffic to dynamic ip? So that there isn't any suspicious line in proxy traffic monitor's output? The best: Proxy doesn't get notice of nasty traffic at all. Perhaps there is some technique to hide data in unsuspicious packets? regards, gimeshell
-- Karyn Pichnarczyk Sandstorm Enterprises, Inc. ______________________________________________________________ Be advised that all electronic communication with Sandstorm Enterprises(R) is subject to monitoring by NetIntercept(R), our full-content network forensics analysis tool. More information about NetIntercept can be found at www.sandstorm.net. Please direct any questions to privacy () sandstorm net. ______________________________________________________________ ------------------------------------------------------------------------------ This List Sponsored by: CenzicConcerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------
Current thread:
- bypassing employer's proxy to surf anonymously (Jun 12)
- Re: bypassing employer's proxy to surf anonymously Hubert Seiwert (Jun 13)
- Re: bypassing employer's proxy to surf anonymously alan (Jun 13)
- Re: bypassing employer's proxy to surf anonymously (Jun 13)
- Re: bypassing employer's proxy to surf anonymously dajackman (Jun 13)
- Re: bypassing employer's proxy to surf anonymously (Jun 14)
- Re: bypassing employer's proxy to surf anonymously Karyn Pichnarczyk (Jun 13)
- Re: bypassing employer's proxy to surf anonymously (Jun 13)
- RE: bypassing employer's proxy to surf anonymously Erin Carroll (Jun 13)
- Re: bypassing employer's proxy to surf anonymously Ivan Arce (Jun 13)
- Re: bypassing employer's proxy to surf anonymously (Jun 13)
- Re: bypassing employer's proxy to surf anonymously Hubert Seiwert (Jun 13)
- Re: bypassing employer s proxy to surf anonymously misiu (Jun 13)
- Re: bypassing employer s proxy to surf anonymously Mario Platt (Jun 13)
- Re: bypassing employer s proxy to surf anonymously gimeshell (Jun 14)
- Re: bypassing employer s proxy to surf anonymously Gary E. Miller (Jun 14)
- Re: bypassing employer s proxy to surf anonymously (Jun 15)
- <Possible follow-ups>
- RE: bypassing employer's proxy to surf anonymously Craig Wright (Jun 13)
- Re: bypassing employer's proxy to surf anonymously Paul Robertson (Jun 13)