On Fri, 4 Dec 2009 14:13:11 -0800
Tyler MacDonald ty...@macdonald.name wrote:
...
I believe when you use SOCKS, your browser stops doing DNS resolution and
just hands the hostnames directly to the SOCKS server. So all they would be
able to sniff is your encrypted SSH session, which they
On Fri, 4 Dec 2009 14:13:11 -0800
Tyler MacDonald ty...@macdonald.name wrote:
Tudod Ki tudodk...@yahoo.com wrote:
...
- Can anyone sniff the traffic of computer B? e.g.: B computer is at a
- server farm [others in the farm can see the traffic?] - I think yes, but
- I'm not sure :O
Tudod Ki tudodk...@yahoo.com wrote:
if I:
ssh -fND localhost:6000 someb...@192.168.56.5 -p PORTNUMBER
from computer A to computer B [B = 192.168.56.5] then I can set the SOCKS
proxy for e.g.: Firefox to use localhost:6000 on computer A. Ok. I can
surf the web through B.
But:
- Can
...@macdonald.name
Subject: Re: two questions about ssh tunneling
To: Tudod Ki tudodk...@yahoo.com
Cc: Debian User debian-user@lists.debian.org
Date: Friday, December 4, 2009, 10:13 PM
Tudod Ki tudodk...@yahoo.com wrote:
if I:
ssh -fND localhost:6000 someb...@192.168.56.5 -p PORTNUMBER
from computer
Tudod Ki tudodk...@yahoo.com wrote:
but what's with cam attack?
http://en.wikipedia.org/wiki/CAM_Table#Attacks
they could attack a switch, and it will act as a hub? and then they can
set promiscuous mode on their cards and sniff
Hmm. I didn't know about that one! I suppose it's
5 matches
Mail list logo