Networking

Jun 13th, 2006

Comments: 0
Category: Networking
Read More

Change of name for Ethereal

TaoSecurity Ethereals changing name to the snappy “wireshark “. Sounds like good news to me for the very trivial reason that I always used to go looking for Ethereal at www.ethereal.org only to find that it wasn’t there ;op

Jul 24th, 2005

Category: Networking
Read More

ToR

Nitesh Dhanjani Post about using ToR to launch attacks (or in this case vulnerability scanners). Using this it appears that you can be more or less anonymous on the Internet, at a network level anyway. Only the entry point to the ToR network will know the origin of your traffic. Of course if you get […]

Jun 22nd, 2005

Category: Networking
Read More

Excellent Interview with Marcus Ranum

Interview with Marcus Ranum There’s a great interview with Marcus Ranum over at Securityfocus. It’s obvious from the responses that he’s been around in network security for a while and knows what’s what.. Also there’s a couple of great quotes… in response to “If a standard protocol is broken or insecure, what is the best […]

May 15th, 2005

Comments: 0
Category: Networking
Read More

Ping Tunnel

Ping Tunnel – Send TCP traffic over ICMP Another great example of why once you allow one protocol/port through your firewall, it’s pretty easy to get any other traffic through… This one’s interesting, in that it levereges ICMP…

Mar 30th, 2005

Category: Networking
Read More

Handy tutorial on using SSH to bypass firewalls

Breaking Firewalls with OpenSSH and PuTTY This is a good walkthough on using SSH to tunnel other protocols through firewalls. Usually though, I find that the protocols which are left open on firewalls these days are HTTP and sometimes SMTP…. Of course HTTP is all you need as things like SSL VPNS can be used […]