Guest MaxDamage Posted August 10, 2006 Share Posted August 10, 2006 ... Quote Link to comment Share on other sites More sharing options...
cooper Posted August 10, 2006 Share Posted August 10, 2006 http://proxytunnel.sourceforge.net/ Why recreate the wheel? :D Quote Link to comment Share on other sites More sharing options...
metatron Posted August 10, 2006 Share Posted August 10, 2006 Simple icmp tunnel http://sourceforge.net/projects/itun Simple icmp tunnel provide encapsulation of IP packets into ICMP packets. It can be used to pass through firewalls which not block icmp packets. Quote Link to comment Share on other sites More sharing options...
PoyBoy Posted August 10, 2006 Share Posted August 10, 2006 use a VPN. Windows XP has built in support for VPN connections. Go to Network Connections...New Connection... I think its in one of the episode. Podzinger it Quote Link to comment Share on other sites More sharing options...
stingwray Posted August 10, 2006 Share Posted August 10, 2006 You could do it over DNS as well, that would be cool, also a dual purpose for when your on APs as that apparantly can get through without authentication. Also, HTTPS isn't that great, you network admin could be reading your HTTPS traffic if he really wanted to. Quote Link to comment Share on other sites More sharing options...
Guest MaxDamage Posted August 10, 2006 Share Posted August 10, 2006 ...……. Quote Link to comment Share on other sites More sharing options...
Guest MaxDamage Posted August 10, 2006 Share Posted August 10, 2006 ... Quote Link to comment Share on other sites More sharing options...
Guest MaxDamage Posted August 10, 2006 Share Posted August 10, 2006 ... Quote Link to comment Share on other sites More sharing options...
Guest MaxDamage Posted August 10, 2006 Share Posted August 10, 2006 ... Quote Link to comment Share on other sites More sharing options...
cooper Posted August 10, 2006 Share Posted August 10, 2006 Also, HTTPS isn't that great, you network admin could be reading your HTTPS traffic if he really wanted to. *cough*'scuse me? :shock: Quote Link to comment Share on other sites More sharing options...
Guest MaxDamage Posted August 10, 2006 Share Posted August 10, 2006 ... Quote Link to comment Share on other sites More sharing options...
stingwray Posted August 10, 2006 Share Posted August 10, 2006 *cough*'scuse me? You can set the proxy up to make the HTTPS connection with the server you are talking to, so that connection uses the SSL cert. between the server and the proxy, then the proxy will create another SSL connection using its own SSL cert. which will have been bought/generate by the admin, between the proxy and your computer. Therefore, not secure, because the admin can read your traffic. Quote Link to comment Share on other sites More sharing options...
Sparda Posted August 10, 2006 Share Posted August 10, 2006 Also, HTTPS isn't that great, you network admin could be reading your HTTPS traffic if he really wanted to. That is true, thats why when using a computer on a coperate network you must always read what the SSL certificate says. Better yet, use portable firefox. However, the using portable firefox trick to detect SSL 'intrusion' (shall we call it) doesn't work if tehy bought the certificate from a trusted source. Quote Link to comment Share on other sites More sharing options...
cooper Posted August 10, 2006 Share Posted August 10, 2006 Ah! But then SSL traffic isn't easily readable. Users are easily fooled in accepting a fake cert for a real one. Now, that ProxyTunnel program basically allows you to set up a connection with an external service through a proxy. The idea is that on the other end there's a machine running sshd. And I don't know about the SSH clients you use, but mine complain VERY LOUDLY and in fact REFUSE to allow you to log into them when the keys have changed. Quote Link to comment Share on other sites More sharing options...
Sparda Posted August 10, 2006 Share Posted August 10, 2006 Ah! But then SSL traffic isn't easily readable. Users are easily fooled in accepting a fake cert for a real one. Not exacly, the admins can easily configure IE on all the computer to except there certificate as the real deal. Thats why using firefox would usualy get around this. Quote Link to comment Share on other sites More sharing options...
l0gic Posted August 11, 2006 Share Posted August 11, 2006 I want to do anything from work so I need all ports available. If you don't value your employment, go for it. Quote Link to comment Share on other sites More sharing options...
cooper Posted August 11, 2006 Share Posted August 11, 2006 Not exacly, the admins can easily configure IE on all the computer to except there certificate as the real deal. Thats why using firefox would usualy get around this. The object is to _bypass_ the proxy, and connect to your home system where you're running your own, less restrictive proxy. Quote Link to comment Share on other sites More sharing options...
Guest MaxDamage Posted August 11, 2006 Share Posted August 11, 2006 ... Quote Link to comment Share on other sites More sharing options...
majk Posted August 12, 2006 Share Posted August 12, 2006 Can't you just use SSH tunneling like in episode 7? Quote Link to comment Share on other sites More sharing options...
Sparda Posted August 12, 2006 Share Posted August 12, 2006 No, most HTTP proxies won't allow SSH tunneling. Quote Link to comment Share on other sites More sharing options...
cooper Posted August 12, 2006 Share Posted August 12, 2006 That proxytunnel link is like SSH tunneling with an added little program that SSH will execute first to get a connection to a remote machine which traverses the proxy. See the paper on the site I liked to in the second post of this thread. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.