On Thu, 2003-08-07 at 00:03, Robinson, Eric R. wrote:
> I am using this fun little experiment to demonstrate to folks here at
> NDOT how a simple executable could be used to bypass our firewall and
> give a remote intruder real-time access to the NDOT network.
> I guess this officially makes me a script kiddy, although I am 42, so
> perhaps script “daddy” would be more accurate. :-) 
> 
> Of course, this sort of thing will be old hat to many of you. Does
> anyone else in the list do this kind of experimentation? It would be
> fun to compare notes.

Script Daddy,

The DRI.edu network uses a proxy to route all port 80 and 443 traffic to
the net, so there is no way to access the internal machines or the
internal machines to access external machines, except to have the proxy
to do the request.

This would be a good way to prevent reverse exploits to the NDOT
network, at the annoyance of using a proxy.

If anyone knows a way around this proxy situation, or how to do reverse
connections using a proxy, I'd be quite interested.

Mark
-- 
Mark C. Ballew <[EMAIL PROTECTED]>
Sublinear.net

_______________________________________________
RLUG mailing list
[EMAIL PROTECTED]
http://www.rlug.org/mailman/listinfo/rlug

Reply via email to