how to bypass a proxy server???

servin247365

Senior member
Oct 11, 2005
240
0
0
does anyone know how to bypass a proxy server that uses port 8080 and port 80 is closed??

any help would be great.

thanks,

Jordan
 

Nothinman

Elite Member
Sep 14, 2001
30,672
0
0
If the network is setup properly, you don't. Contact your network administrator and explain to them why you need to bypass the proxy, if it's a valid reason they'll have no problem helping you.
 

FreshPrince

Diamond Member
Dec 6, 2001
8,361
1
0
Originally posted by: Nothinman
If the network is setup properly, you don't. Contact your network administrator and explain to them why you need to bypass the proxy, if it's a valid reason they'll have no problem helping you.

yup, if it's business related, I'm sure your net. admin. will have no problems putting that url in proxy server's the exceptions list.

now if you just want to surf for any purpose, assuming anonymizer isn't blocked, you can use it.
 

blemoine

Senior member
Jul 20, 2005
312
0
0
skyking: what do you do when you can't block the method? or have you not found one that you couldn't block yet?
 

Nothinman

Elite Member
Sep 14, 2001
30,672
0
0
skyking: what do you do when you can't block the method? or have you not found one that you couldn't block yet?

If the network is setup properly it will be impossible to go around the proxy server. But it is possible to work through the proxy server and get it to allow whatever traffic you want.
 

skyking

Lifer
Nov 21, 2001
22,774
5,933
146
Originally posted by: blemoine
skyking: what do you do when you can't block the method? or have you not found one that you couldn't block yet?

I have been able to block every method I find. I don't claim to be a proxy guru, but I can read logs, anylize traffic, and make the necessary changes.
 

blemoine

Senior member
Jul 20, 2005
312
0
0
If the network is setup properly it will be impossible to go around the proxy server

so what is the method for blocking some encrypted traffic but not all of it?
 

Nothinman

Elite Member
Sep 14, 2001
30,672
0
0
I have been able to block every method I find. I don't claim to be a proxy guru, but I can read logs, anylize traffic, and make the necessary changes.

Unless you have a SSL accelerator to decrypt the HTTPS traffic you can't analyze it and you have at allow virtually everything through it.
 

blemoine

Senior member
Jul 20, 2005
312
0
0
i am not talking about https traffic. i am talking about someone making a vpn connection to there house and then surfing the web using a proxy server located at their house.
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
unless that tunnel is running on port 443 it ain't getting out.

even then an IDS sensor can recognize tunnel like activity from a normal SSL connection and shun the connection. but that gets rather sophisticated.

This feature was meant to prevent people (contractors, vendors) from using their SSL VPN concentrators at their home office. security no-no to allow this sort of thing.
 

Nothinman

Elite Member
Sep 14, 2001
30,672
0
0
unless that tunnel is running on port 443 it ain't getting out.

It's not difficult to setup your SSH server on port 443.

even then an IDS sensor can recognize tunnel like activity from a normal SSH connection and shun the connection. but that gets rather sophisticated.

AFAIK you can't differentiate between a normal SSH connection and one that's got forwarding (or the new full VPN tunneling they added). Yes yo ucan see the SSH handshake because they have to exchange versions in the clear, but that's it. And you don't have to use SSH, it's just the easiest to setup IMO. There are a ton of "SSL VPNs" out there.
 

Nothinman

Elite Member
Sep 14, 2001
30,672
0
0
I amended my post right after you replied. =)

We've never had to look at blocking SSL VPNs, how do you differentiate them from normal SSL traffic?
 

FreshPrince

Diamond Member
Dec 6, 2001
8,361
1
0
Originally posted by: Nothinman
I amended my post right after you replied. =)

We've never had to look at blocking SSL VPNs, how do you differentiate them from normal SSL traffic?

the only way I know is if all web traffic goes through proxy with a whitelist.

everything else gets blocked.

that might work, but it would take a while to build a decent whitelist....
 

bwanaaa

Senior member
Dec 26, 2002
739
1
81
even if you got through, it's always possible (probable) that only certain known ip addresses would be permitted as destinations.
 

skyking

Lifer
Nov 21, 2001
22,774
5,933
146
I also have access to the clients themselves.
That makes it a bit easier, since they forget to clear history;)
 

Garion

Platinum Member
Apr 23, 2001
2,331
7
81
Sure, there's several ways to bypass a proxy. Actually, that's a misnomer - You don't bypass it, you tunnel through it. Depending on the size of the company, you might get away with it for a while. But eventually it'll come out in the end and we'll find you.

Two things to keep in mind:

It's THEIR network. Not yours. They have every right to (and do!) log every bit of traffic that goes in and out. If you're abusing the privledge you're going to get busted. Most good proxy guys get reports of what's happening on their infrastructure each day and they tend to notice things like a bunch of CONNECT requests to "dhcp1033.phoenix.comcast.net".

Most big companies have an Acceptable Use Policy that says what you can and can't do on their network and infrastructure. Tunneling traffic that you don't want tracked is definitely a violation. If you break it, you'll get punished or fired. Is it worth it?

FYI, I run the proxy environment for one of the largest banks in the US. We pump almost 100M URL requests through each day, sometimes upwards of 250Mb/s of Internet traffic. My daily reports go straight to the security group. People get fired at least weekly for doing dumb things. We try to prevent it, but we can't stop intelligent idiots from bypassing the systems and getting themselves in trouble. Do me a favor. Don't be one of them.

If you work for my bank, I'll be watching for you. Don't tick me off and abuse my toys.

- G
 

blemoine

Senior member
Jul 20, 2005
312
0
0
Garion: I work for a small bank but we are both held to the same standards. By passing the proxy is not a problem or even an issue. you know like i do that the FDIC Examiners are not only concerned that this is not happening but that it is being prevented before it can become an issue.

Most big companies have an Acceptable Use Policy that says what you can and can't do on their network and infrastructure. Tunneling traffic that you don't want tracked is definitely a violation. If you break it, you'll get punished or fired. Is it worth it?

i don't think someone with a malicious intent is going to hardly stop because of a policy or even the fear of being fired.

Most good proxy guys get reports of what's happening on their infrastructure each day and they tend to notice things like a bunch of CONNECT requests to "dhcp1033.phoenix.comcast.net".

are these "real time reports"? I know mine are a day behind. so when we look at these reports the damage may already be done. that is kind of scary.
 

RebateMonger

Elite Member
Dec 24, 2005
11,586
0
0
Originally posted by: Goosemaster
Originally posted by: skyking
I also have access to the clients themselves.
That makes it a bit easier, since they forget to clear history;)
dude...you're so evil:p
When I was a poor, ordinary USER, I always cleared my history and my temporary files, just in case....

On another note, this reminds me of a woman I did some work for. She was the President of a major non-profit religious-oriented company.

When I looked at her laptop at her home, she showed me a bunch of "evil" IE history files....XXXHotWomen, etc.... She demanded that I get them off there, and wanted to know how they could have possibly gotten onto her computer.

I smiled at her teenage son.....