Jump to content

Invisible on a LAN network


x_marksthespot

Recommended Posts

Hello Guys

The question that I have is quite simple… Let’s say that I have access to my office network but instead of using the office pc, I take my notebook with the same config to give me the same access to the network, what I’m most interested is having web access Without being seen, mainly because I view some sites that I work as admin in my notebook and some web applications that need to access the internet wile I’m on the office -)

Resuming I wanna be on the network without being seen, Is that possible?

If use the program HideIP to change my location, can that just do it?

Thanks guys for your time & I hope that someone can help me

Link to comment
Share on other sites

In short, this all depends on how the network is setup. Is there a firewall, are you in the DMZ, is there a network admin who has any idea of what he is doing?

For example, where I work, this would not be possible. The domain would not give you an IP as the MAC's dont add up. But if you wanted to spoof your MAC you are still blocked at the Firewall/Server before ever getting to the modem.

Port traffic tends to get flagged then emailed to the administrator.

So, depends on your network.

Link to comment
Share on other sites

There is actually many ways to do this, but like what has been stated, it all depends on your networks configuration. If the person who is running your server/firewall has any clue about security, they will limit out the possibilitys.

But, give it a try and see how it works. You can alwasy use some commands from another computer to test it out and see if you are visible or not.

Link to comment
Share on other sites

They won't be able to figure out who "You" is. The exit node can tell someone on the network requested something, but he won't know who it was.

When you're just a regular node rather than an exit node you won't even be able to figure out what was being requested over the network.

As cool and hippy-esque that may be, think about that for a sec. Do you really want to be a gateway for potentially horrendously harmful material (kiddie porn and the like)? Does the benefit of giving dissenters in an unfree society a way to get their opinion and information out of the country securely weigh up to this?

Link to comment
Share on other sites

They won't be able to figure out who "You" is. The exit node can tell someone on the network requested something, but he won't know who it was.

Although this may be true, I think it (again :P ) depends on the network setup. If you're planning on plugging into an network port and the admin knows the network pretty well (or has a topology diagram), they can find you in no time at all. If they notice you that is.

Link to comment
Share on other sites

Um. We are still talking about TOR here, right? The program that dynamically routes your traffic across nodes, encrypts all inter-node communication to an insane level and changes routes once per minute?

The only thing an admin can do when the TOR network is contained entirely within his own network is to correllate traffic bursts to machines, but that would take a _LOT_ of effort, and, again, require the entire TOR network is contained within the network he's admin for (which would be a bit silly).

Link to comment
Share on other sites

Well I’ve been taking in consideration everything that you guys have been saying and by now I guess that using TOR is be best idea,

What I know about the Network is very limited, lets see:

- It’s in use a Automatic Configuration Scrip (that I can access from the IE “LAN Settings†menu)

- The script looks like this: http://pac.lb.â€companynameâ€.corp/cgi-bin/pac.pl

- In the IP Definitions I have: DHCP Activated & Metric Interface: 1

- In the DNS I unchecked the box that says: “Register this connection’s addresses in DNS

- In WINS I have: LMHOST search activated & Deactivate NetBIOS trough TCPIP

And just by this config I can access the net. It was bean said that the network could be contaminated by my pc for seeing some more inappropriate sites like porn and such, but it isn’t like that at all, like I’ve mentioned before, I work with some applications that require using the net, and also mails, searches and so on.

So is it safe to use TOR or can I be detected, or my location on the network, wend I plug in the notebook?

Once Again Thanks to all of you guys

Link to comment
Share on other sites

If from what you say is true and you are using it for work reasons I would jsut goto your CSO and request that you are to use your notebook at work or that they install the software that you need on your work PC because as you siad you have a very limited knowledge of you work network so I assume your knowledge of networking is going to some what limited andyou are making a high risk of infecting other PCs on the network or worse even killing the entire thing then how would that look when they trace everything back in the logs to your port at your desk. Not good there buddy. Don't risk your job for something like Pron while your at work not worth it. :shock: :shock: :shock: 8)

Link to comment
Share on other sites

in short you cannot hide your presence and send/recieve data.

However you can hide who you are, which is what most of the others are talking about. Depending on how the network is setup, I wouldn't do anything I didn't want to be traced back to me from such a connection. If you are at a large company. they probly have sniffers checking for users using stuff like this. A smaller one is less likely to find such a box. However please note that If discovered, you will be in big trouble, It would be considered the same as hacking the network since you are bypasing security. you could be fired, so dont do it unless you know what you are doing.

Link to comment
Share on other sites

Hum....I'm not sure TOR would be able to make you stealth with your office network.

I've read a bit of the TOR documentation and what I've understood is you get stealth in the WAN. For example, you go to a website, this website will see a proxy IP address and not the IP address of the company.

For me, in your LAN office, the data will still show your IP address until it goes on the router.

forgive me if I'm wrong :oops:

Anyway, as it was said before, you could easily be caught. It's actually depends of your network admin, and LAN equipment.

For example, with CISCO switchs, from an IP address or a MAC address, you can find on which switch and which port a machine is plugged into.

A network probe plugged into the main switch could also alert the network admin about an unusual traffic.

Link to comment
Share on other sites

I'm with Jester on this one, if you need to use it for work, go ask someone to get you on the correct way.

I can tell you, as an admin, if I found out that a user was pulling a stunt like this on the network I would go into full-on 400 pound gorilla mode.

Damn right, and so would most other admins.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...