From: Gary E. Miller (gem@rellim.com)
Date: Thu Sep 02 2004 - 16:39:54 EDT
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Yo Robert!
On Thu, 2 Sep 2004, Burnett, Robert wrote:
> If you span a port on your internal switch (assuming you have an interna
> l switch) and sniff all traffic traveling through it, you could ngrep fo
> r HTTP CONNECT requests. This would detect connections to the proxy ser
> vers.
Unless:
1. The proxy traffic is using trivial encryption, like https, ssh,
openvpn, socks/ssl, etc. Then all you will sniff is gibberish.
2. The proxy traffic is going around your firewall using POTS, Cell
Phone, CPDP, Wi-Fi, etc.
RGDS
GARY
- ---------------------------------------------------------------------------
Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701
gem@rellim.com Tel:+1(541)382-8588 Fax: +1(541)382-8676
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)
iD8DBQFBN4Ud8KZibdeR3qURAly9AKCf+hQnLH0L7FTFQ6kRETMueKBeVgCg3WBg
NKQm/JzyumQezSdSFlLZt8Q=
=lho6
-----END PGP SIGNATURE-----
------------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Check out our Advanced Hacking course,
learn to write exploits and attack security infrastructure. Attend a course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.
http://www.infosecinstitute.com/courses/ethical_hacking_training.html
-------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:03 EDT