x_marksthespot Posted October 11, 2006 Share Posted October 11, 2006 Hello Guys The question that I have is quite simple… Let’s say that I have access to my office network but instead of using the office pc, I take my notebook with the same config to give me the same access to the network, what I’m most interested is having web access Without being seen, mainly because I view some sites that I work as admin in my notebook and some web applications that need to access the internet wile I’m on the office -) Resuming I wanna be on the network without being seen, Is that possible? If use the program HideIP to change my location, can that just do it? Thanks guys for your time & I hope that someone can help me Quote Link to comment Share on other sites More sharing options...
pseudobreed Posted October 11, 2006 Share Posted October 11, 2006 In short, this all depends on how the network is setup. Is there a firewall, are you in the DMZ, is there a network admin who has any idea of what he is doing? For example, where I work, this would not be possible. The domain would not give you an IP as the MAC's dont add up. But if you wanted to spoof your MAC you are still blocked at the Firewall/Server before ever getting to the modem. Port traffic tends to get flagged then emailed to the administrator. So, depends on your network. Quote Link to comment Share on other sites More sharing options...
spektormax Posted October 11, 2006 Share Posted October 11, 2006 1 word TOR http://tor.eff.org or an SSH to your comptuer or a server or a VPN take your pick Quote Link to comment Share on other sites More sharing options...
Yourmysin Posted October 11, 2006 Share Posted October 11, 2006 There is actually many ways to do this, but like what has been stated, it all depends on your networks configuration. If the person who is running your server/firewall has any clue about security, they will limit out the possibilitys. But, give it a try and see how it works. You can alwasy use some commands from another computer to test it out and see if you are visible or not. Quote Link to comment Share on other sites More sharing options...
ChevronX Posted October 11, 2006 Share Posted October 11, 2006 I was going to ask, say you use TorPark. Can the admin of suck a domain see where you have been or is it entirly secure? Quote Link to comment Share on other sites More sharing options...
cooper Posted October 11, 2006 Share Posted October 11, 2006 They won't be able to figure out who "You" is. The exit node can tell someone on the network requested something, but he won't know who it was. When you're just a regular node rather than an exit node you won't even be able to figure out what was being requested over the network. As cool and hippy-esque that may be, think about that for a sec. Do you really want to be a gateway for potentially horrendously harmful material (kiddie porn and the like)? Does the benefit of giving dissenters in an unfree society a way to get their opinion and information out of the country securely weigh up to this? Quote Link to comment Share on other sites More sharing options...
barrytone Posted October 11, 2006 Share Posted October 11, 2006 They won't be able to figure out who "You" is. The exit node can tell someone on the network requested something, but he won't know who it was. Although this may be true, I think it (again :P ) depends on the network setup. If you're planning on plugging into an network port and the admin knows the network pretty well (or has a topology diagram), they can find you in no time at all. If they notice you that is. Quote Link to comment Share on other sites More sharing options...
cooper Posted October 11, 2006 Share Posted October 11, 2006 Um. We are still talking about TOR here, right? The program that dynamically routes your traffic across nodes, encrypts all inter-node communication to an insane level and changes routes once per minute? The only thing an admin can do when the TOR network is contained entirely within his own network is to correllate traffic bursts to machines, but that would take a _LOT_ of effort, and, again, require the entire TOR network is contained within the network he's admin for (which would be a bit silly). Quote Link to comment Share on other sites More sharing options...
barrytone Posted October 11, 2006 Share Posted October 11, 2006 Dammit. Forgot we were talking about Tor :P Surely on a Lan there is someway to idenfity which machine on a LAN is the only one running Tor, though? I've not had chance to play with it in depth :roll: Quote Link to comment Share on other sites More sharing options...
ChevronX Posted October 11, 2006 Share Posted October 11, 2006 Thanks for clearing it up Quote Link to comment Share on other sites More sharing options...
x_marksthespot Posted October 12, 2006 Author Share Posted October 12, 2006 Well I’ve been taking in consideration everything that you guys have been saying and by now I guess that using TOR is be best idea, What I know about the Network is very limited, lets see: - It’s in use a Automatic Configuration Scrip (that I can access from the IE “LAN Settings†menu) - The script looks like this: http://pac.lb.â€companynameâ€.corp/cgi-bin/pac.pl - In the IP Definitions I have: DHCP Activated & Metric Interface: 1 - In the DNS I unchecked the box that says: “Register this connection’s addresses in DNS - In WINS I have: LMHOST search activated & Deactivate NetBIOS trough TCPIP And just by this config I can access the net. It was bean said that the network could be contaminated by my pc for seeing some more inappropriate sites like porn and such, but it isn’t like that at all, like I’ve mentioned before, I work with some applications that require using the net, and also mails, searches and so on. So is it safe to use TOR or can I be detected, or my location on the network, wend I plug in the notebook? Once Again Thanks to all of you guys Quote Link to comment Share on other sites More sharing options...
Jester Posted October 12, 2006 Share Posted October 12, 2006 If from what you say is true and you are using it for work reasons I would jsut goto your CSO and request that you are to use your notebook at work or that they install the software that you need on your work PC because as you siad you have a very limited knowledge of you work network so I assume your knowledge of networking is going to some what limited andyou are making a high risk of infecting other PCs on the network or worse even killing the entire thing then how would that look when they trace everything back in the logs to your port at your desk. Not good there buddy. Don't risk your job for something like Pron while your at work not worth it. :shock: :shock: :shock: 8) Quote Link to comment Share on other sites More sharing options...
billybob Posted October 18, 2006 Share Posted October 18, 2006 in short you cannot hide your presence and send/recieve data. However you can hide who you are, which is what most of the others are talking about. Depending on how the network is setup, I wouldn't do anything I didn't want to be traced back to me from such a connection. If you are at a large company. they probly have sniffers checking for users using stuff like this. A smaller one is less likely to find such a box. However please note that If discovered, you will be in big trouble, It would be considered the same as hacking the network since you are bypasing security. you could be fired, so dont do it unless you know what you are doing. Quote Link to comment Share on other sites More sharing options...
nico Posted October 18, 2006 Share Posted October 18, 2006 Hum....I'm not sure TOR would be able to make you stealth with your office network. I've read a bit of the TOR documentation and what I've understood is you get stealth in the WAN. For example, you go to a website, this website will see a proxy IP address and not the IP address of the company. For me, in your LAN office, the data will still show your IP address until it goes on the router. forgive me if I'm wrong :oops: Anyway, as it was said before, you could easily be caught. It's actually depends of your network admin, and LAN equipment. For example, with CISCO switchs, from an IP address or a MAC address, you can find on which switch and which port a machine is plugged into. A network probe plugged into the main switch could also alert the network admin about an unusual traffic. Quote Link to comment Share on other sites More sharing options...
Uncle Toxie Posted October 18, 2006 Share Posted October 18, 2006 I'm with Jester on this one, if you need to use it for work, go ask someone to get you on the correct way. I can tell you, as an admin, if I found out that a user was pulling a stunt like this on the network I would go into full-on 400 pound gorilla mode. Quote Link to comment Share on other sites More sharing options...
Jester Posted October 18, 2006 Share Posted October 18, 2006 @Uncle Toxie ROTFLMAO King Kong Mode is great love seeing that. 8) 8) 8) Quote Link to comment Share on other sites More sharing options...
moonlit Posted October 18, 2006 Share Posted October 18, 2006 I'm with Jester on this one, if you need to use it for work, go ask someone to get you on the correct way.I can tell you, as an admin, if I found out that a user was pulling a stunt like this on the network I would go into full-on 400 pound gorilla mode. Damn right, and so would most other admins. Quote Link to comment Share on other sites More sharing options...
x_marksthespot Posted October 23, 2006 Author Share Posted October 23, 2006 Thanks guys, I’ll definitely consider all that you have said Quote Link to comment Share on other sites More sharing options...
operat0r_001 Posted October 24, 2006 Share Posted October 24, 2006 ssh tunnel firefox with forward DNS over tunnel checked ( dont want your DNS to be sniffed now do you ? ) Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.