Re: Proof of Concept Tool on Web Application Security

From: Jörg Schütter (joerg@schuetter.org)
Date: Sun Apr 27 2003 - 09:04:48 EDT


Hallo Indian Tiger,

On Tue, 15 Apr 2003 23:35:34 +0530
"Indian Tiger" <indiantiger@mailandnews.com> wrote:

[...]
> This manipulation can also be achieved if an Attacker can put his
> Proxy (Web Sleuth) on intermediate Router/Proxy. One Example is I am
> accessing Hotmail and on my ISP Router/Proxy, An attacker installs
> tool like Web Sleuth. But again question comes Router works on OSI
> layer 3 so attacker can't put tool like Web Sleuth. If intermediate
> hop is Proxy which is on Application level, there should be some tool
> which can be placed here.

Have a look at http://en.tldp.org/HOWTO/mini/TransparentProxy.html which
explains how to use squid as transparent proxy by using iptables.

Gruß
  Jörg

-- 
Dipl.-Ing. Jörg Schütter           http://www.lug-untermain.de/
                                   http://www.schuetter.org/joerg/
joerg@schuetter.org                http://mypenguin.bei.t-online.de/




This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:32 EDT