Penetration Testing mailing list archives
Re: bypassing employer's proxy to surf anonymously
From: "" <gimeshell () web de>
Date: Thu, 15 Jun 2006 02:05:51 +0200
On Tue, 13 Jun 2006 13:46:56 -0400 "Levenglick, Jeff" <JLevenglick () fhlbatl com> wrote:
1) Is there any other way for you to send your data or must you go through a proxy? (ie: firewall blocking all traffic except The proxy box) If you can send your data, then just avoid the proxy. If not, then the only thing you could do is try to spoof the ip/mac of the Proxy and send your data. (unless you know what your doing then this is not an option for you :) )
Firewall/packetfilter (running on proxy server) is blocking all traffic except proxy. Am i right when saying to make spoofing IP/MAC of the proxy work there must be a another seperate firewall before WAN i can work directly with spoofed IP/MAC? If not, why should i spoof IP/MAC?
2) What is nasty traffic? Are you not allowed ssh? Ssh is encrypted, so they can't view your data. 3) hide data? (Karyn) There really is no such thing. Yes, you can change ports, but that would just set off more Alerts. On top of that, he is going to another box so he must use the port that the host is listening on. You can mess around with the payload, but ssh is an encrypted prot, so your going to end up with more problems then it Is worth. If you think about it: If he is on a company network and I'm an admin who wants to find out who is Sending the traffic, I can track you down to your port. (ie: you change your ip or mac address to hide yourself)
This depends on skills of network admin. An admin who doesn't care about packet sniffing and other deeper techniques but does only look at his protocols -which structure and content is known- doesn't care about more or less hidden ssh traffic reported in proxy's logs as 'connection to xxx.xxx.xxx.xxx (HTTPS) 5 calls/10 MB'. regards, gimeshell ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------
Current thread:
- Re: bypassing employer s proxy to surf anonymously, (continued)
- Re: bypassing employer s proxy to surf anonymously misiu (Jun 13)
- Re: bypassing employer s proxy to surf anonymously Mario Platt (Jun 13)
- Re: bypassing employer s proxy to surf anonymously gimeshell (Jun 14)
- Re: bypassing employer s proxy to surf anonymously Gary E. Miller (Jun 14)
- Re: bypassing employer s proxy to surf anonymously (Jun 15)
- Re: bypassing employer s proxy to surf anonymously misiu (Jun 13)
- RE: bypassing employer's proxy to surf anonymously Craig Wright (Jun 13)
- Re: bypassing employer's proxy to surf anonymously Paul Robertson (Jun 13)
- RE: bypassing employer's proxy to surf anonymously alan (Jun 13)
- Re: bypassing employer's proxy to surf anonymously Aaron (Jun 14)
- RE: bypassing employer's proxy to surf anonymously Levenglick, Jeff (Jun 13)
- Re: bypassing employer's proxy to surf anonymously (Jun 14)
- Re: bypassing employer's proxy to surf anonymously Syv Ritch (Jun 14)
- Re: bypassing employer's proxy to surf anonymously (Jun 14)
- RE: bypassing employer's proxy to surf anonymously Craig Wright (Jun 13)