From: Lewis GySgt Richard C (LewisRC@29palms.usmc.mil)
Date: Wed Feb 25 2004 - 17:13:47 EST
Kuda,
There is an exploit by changing the requested sites IP address to
octal format. Read more here:
http://cert.uni-stuttgart.de/archive/bugtraq/2001/03/msg00305.html
There is also an exploit by sending the request in multiple packets. Read
more here:
http://www.securityfocus.com/bid/2910
There is another exploit by appending a "." to the end of the requested
site. Read more here:
http://www.securiteam.com/securityreviews/5SP010U0KQ.html
Hope this helps,
Richard Lewis
GSEC, Security+, CCNA, MCP
-----Original Message-----
From: Kudakwashe Chafa-Govha [mailto:KChafa-Govha@bankunitedfla.com]
Sent: Wednesday, February 25, 2004 1:04 PM
To: 'pen-test@securityfocus.com'
Subject: By passing surf control
Hello Group,
Does anyone have any information on how to by pass a web content filter? We
use Surf Control to monitor and filter web content. However, I have one of
my users who was able to by pass this. We tried using a proxy to by pass
just for testing purposes but it did not work. I am still trying to figure
out what other method he used to do so. If anyone has any information , it
will be greatly appreciated.
Thanks
Kuda
****************************************************************************
**********************
The contents of this email and any attachments are confidential.
It is intended for the named recipient(s) only.
If you have received this email in error please notify the system manager or
the
sender immediately. Unless you are the intended recipient or his/her
representative
you are not authorized to, and must not, read, copy, distribute, use or
retain this
message or any part of it.
****************************************************************************
**********************
---------------------------------------------------------------------------
----------------------------------------------------------------------------
---------------------------------------------------------------------------
----------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:49 EDT