Penetration Testing mailing list archives

[tool] Webtunnel 0.0.5


From: Janos Szatmary <jszatmary () users sourceforge net>
Date: Tue, 17 Mar 2009 21:53:48 -0400

I'd like to announce the release of Webtunnel 0.0.5, available at http://sourceforge.net/projects/webtunnel .



WHAT'S NEW

2009/03/17

    Added support for proxy auto-configuration
Fixed a bug that would cause a keep-alive timeout to stop the tunnel
    Fixed a fork handling bug to support ActivePerl's negative PIDs

ABOUT

Webtunnel is a network utility that encapsulates arbitrary data in HTTP and transmits it through a web server. In that regard, it is similar to httptunnel, however, it has several key important differences: its server component runs in the context of a web server as a CGI application (with optional FastCGI support) so it does not need its own port, and supports most things that the web server supports, such as authentication, HTTP 1.1, HTTPS, and client certificates; it uses simple requests and responses so it works seamlessly through forward and reverse proxies; it is multi-threaded (actually multi-process using sockets for inter-process communication) to allow multiple parallel connections to multiple
destinations simultaneously.

EXAMPLES

To tunnel SSH traffic to your web server:

    wtc.pl tcp://localhost:8022 tcp://localhost:22 http://webserver/wts.pl
    ssh -p 8022 user@localhost

To tunnel SSH traffic to some other server besides the web server:

    wtc.pl tcp://localhost:8022 tcp://sshserver:22 http://webserver/wts.pl
    ssh -p 8022 user@localhost

To tunnel OpenVPN traffic through a web server running on a non- standard port
and requiring authentication:

    wtc.pl \
        tcp://localhost:8194 \
        tcp://vpnserver:1194 \
        http://user:pass@webserver:8000/wts.pl

To tunnel OpenVPN traffic through a web and proxy server both requiring auth.:

    wtc.pl \
        tcp://localhost:8194 \
        tcp://vpnserver:1194 \
        http://user1:pass1@webserver/wts.pl \
        http://user2:pass2@proxyserver:8080

To tunnel Telnet traffic through a web server using client certs. for auth.:

    wtc.pl \
        --cert client.crt \
        --key client.key \
        tcp://localhost:8023 \
        tcp://telnetserver:23 \
        https://webserver/wts.pl

To tunnel Telnet traffic through a web server with proxy auto- configuration,
and the proxy server, if any, requiring authentication:

    wtc.pl \
        --pac \
        tcp://localhost:8023 \
        tcp://telnetserver:23 \
        https://webserver/wts.pl \
        http://proxyuser:proxypass@pacserver:8000/proxy.pac

In most examples "https" is a valid alternative for "http".


------------------------------------------------------------------------
This list is sponsored by: InfoSec Institute

Learn all of the latest penetration testing techniques in InfoSec Institute's Ethical Hacking class. Totally hands-on course with evening Capture The Flag (CTF) exercises, Certified Ethical Hacker and Certified Penetration Tester exams, taught by an expert with years of real pen testing experience.

http://www.infosecinstitute.com/courses/ethical_hacking_training.html
------------------------------------------------------------------------


Current thread: