Jump to content

New hack wana join in :)


Guest MaxDamage

Recommended Posts

You could do it over DNS as well, that would be cool, also a dual purpose for when your on APs as that apparantly can get through without authentication.

Also, HTTPS isn't that great, you network admin could be reading your HTTPS traffic if he really wanted to.

Link to comment
Share on other sites

*cough*'scuse me?

You can set the proxy up to make the HTTPS connection with the server you are talking to, so that connection uses the SSL cert. between the server and the proxy, then the proxy will create another SSL connection using its own SSL cert. which will have been bought/generate by the admin, between the proxy and your computer.

Therefore, not secure, because the admin can read your traffic.

Link to comment
Share on other sites

Also, HTTPS isn't that great, you network admin could be reading your HTTPS traffic if he really wanted to.

That is true, thats why when using a computer on a coperate network you must always read what the SSL certificate says. Better yet, use portable firefox. However, the using portable firefox trick to detect SSL 'intrusion' (shall we call it) doesn't work if tehy bought the certificate from a trusted source.

Link to comment
Share on other sites

Ah! But then SSL traffic isn't easily readable. Users are easily fooled in accepting a fake cert for a real one.

Now, that ProxyTunnel program basically allows you to set up a connection with an external service through a proxy. The idea is that on the other end there's a machine running sshd. And I don't know about the SSH clients you use, but mine complain VERY LOUDLY and in fact REFUSE to allow you to log into them when the keys have changed.

Link to comment
Share on other sites

Ah! But then SSL traffic isn't easily readable. Users are easily fooled in accepting a fake cert for a real one.

Not exacly, the admins can easily configure IE on all the computer to except there certificate as the real deal. Thats why using firefox would usualy get around this.

Link to comment
Share on other sites

Not exacly, the admins can easily configure IE on all the computer to except there certificate as the real deal. Thats why using firefox would usualy get around this.

The object is to _bypass_ the proxy, and connect to your home system where you're running your own, less restrictive proxy.

Link to comment
Share on other sites

That proxytunnel link is like SSH tunneling with an added little program that SSH will execute first to get a connection to a remote machine which traverses the proxy. See the paper on the site I liked to in the second post of this thread.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...