From: Jose Maria Lopez (jkerouac@bgsec.com)
Date: Tue Sep 07 2004 - 14:47:55 EDT
El dom, 05 de 09 de 2004 a las 01:26, Daniel Staal escribió:
> --As of Wednesday, September 1, 2004 4:56 PM +0530, vinay mangal is alleged
> to have said:
>
> > I am looking for a tool to find the hidden web proxy server in my local
> > network.
>
> --As for the rest, it is mine.
>
> How about you:
> 1. Figure out what proxy server(s) they *could* be running.
> 2. Write a script to find and report those installed on the local machine.
> 3. Declare a licence audit, and make every user run it on their machine.
> (Telling them it catalogs what programs are installed.)
>
> Just looking at it from a different perspective... ;)
>
> Daniel T. Staal
That can be very useful if you are looking for a proxy installed
by one employee or any person in the local network, that's acting
as a proxy to external connections.
>From what I have understood from the original poster what he wants
to find it's the transparent proxy that it's redirecting his
traffic. But if you are finding an application proxy installed
on one of the desktop computers then it could be possible to do
it just using nmap to see what ports are open in all the computers
in the network, or using nessus to find strange programs listening
on strange ports. Nessus can do a great job in portscanning the
network, it has the nmap capabilities and some more techniques to
find open ports.
-- Jose Maria Lopez Hernandez Director Tecnico de bgSEC jkerouac@bgsec.com bgSEC Seguridad y Consultoria de Sistemas Informaticos http://www.bgsec.com ESPAÑA The only people for me are the mad ones -- the ones who are mad to live, mad to talk, mad to be saved, desirous of everything at the same time, the ones who never yawn or say a commonplace thing, but burn, burn, burn like fabulous yellow Roman candles. -- Jack Kerouac, "On the Road" ------------------------------------------------------------------------------ Ethical Hacking at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Check out our Advanced Hacking course, learn to write exploits and attack security infrastructure. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. http://www.infosecinstitute.com/courses/ethical_hacking_training.html -------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:04 EDT