On Wed, Jun 9, 2010 at 4:27 PM, Girish Venkatachalam
<[email protected]> wrote:
> Rule? What rule? Why should you care about it? You can get around
> every such rule if you are clever and know the big picture. And of
> course you should have access to the right tool and have lot of
> perseverance.

Stop misleading others.  Encouraging someone to break the rules
is immature and irresponsible.

Organizations don't arbitrarily create rules.  They are made because
of 1) govt compliance regulations, 2) IT security policies enforced
by their customers, and 3) industry best practices.

It may be a prank for you, but breaking company security policies also
harms the entire organization as the company's reputation and business
is at stake.  Eg. would you trust your money with a bank that has a poor
security policy?


> Look at tor anonymizers or port forwarding using SSH. In general you
> need a third party machine somewhere for you to help get on to the
> Internet without restrictions.
>
> Use crypto to avoid getting detected. No tool can look inside
> cryptographically protected packets; so tunnel traffic using ssh and
> your sysadmin will be none the wiser.
>
> Run your ssh server on the public IP at port 80. And use it to forward
> all your traffic.

No enterprise firewall/security system is stupid enough to fall for this trick.

Enterprise HTTP proxy servers (Blue Coat, WebSense, IronPort) routinely
break HTTPS/SSL connections.  They call it "SSL visibility".

The best an nmap scan can do is annoy the security admins.  Most firewalls
will automatically detect port scans and take appropriate action.


Organizations of all sizes invest a lot of resources into IT security.
Bypassing them is extremely difficult.  Even if you bypass the systems,
it's near impossible to hide your tracks and you will be held accountable
for your actions.


As I already said, it's okay to be interested in cracking.  But do it using
your own infrastructure.

- Raja
_______________________________________________
ILUGC Mailing List:
http://www.ae.iitm.ac.in/mailman/listinfo/ilugc

Reply via email to