Security Basics mailing list archives

RE: Tunnel any protocol over any protocol?


From: "Jeff Johnson" <jjohnson () neturallyspeaking com>
Date: Tue, 5 May 2009 16:09:49 -0400

I also hear there is something called Vunneling that allows you to
tunnel over RTP packets. 


Thanks,
 
Jeff

-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com]
On Behalf Of Danny Puckett
Sent: Tuesday, May 05, 2009 3:29 PM
To: security-basics () securityfocus com
Subject: RE: Tunnel any protocol over any protocol?

There is a slick utility called Ping Tunnel that allows tunneling over
ping packets.

-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com]
On Behalf Of Chip Panarchy
Sent: Tuesday, May 05, 2009 7:07 AM
To: security-basics () securityfocus com
Subject: Tunnel any protocol over any protocol?

Hello

Is it possible to Tunnel any Protocol (within reason) over any other
protocol?

Eg; http tunnel, https tunnel, ftp tunnel, ssh tunnel etc.

If yes, could you please tell me your preferred programs/tools/scripts
for doing so?

Thanks in advance,

Panarchy

------------------------------------------------------------------------
This list is sponsored by: InfoSec Institute

Learn all of the latest penetration testing techniques in InfoSec
Institute's Ethical Hacking class. 
Totally hands-on course with evening Capture The Flag (CTF) exercises,
Certified Ethical Hacker and Certified Penetration Tester exams, taught
by an expert with years of real pen testing experience.

http://www.infosecinstitute.com/courses/ethical_hacking_training.html
------------------------------------------------------------------------



This email and any attached files are confidential and intended solely for the intended recipient(s). If you are not 
the named recipient you should not read, distribute, copy or alter this email. Any views or opinions expressed in this 
email are those of the author and do not represent those of the  company. Warning: Although precautions have been taken 
to make sure no viruses are present in this email, the company cannot accept responsibility for any loss or damage that 
arise from the use of this email or attachments.

------------------------------------------------------------------------
This list is sponsored by: InfoSec Institute

Learn all of the latest penetration testing techniques in InfoSec Institute's Ethical Hacking class.
Totally hands-on course with evening Capture The Flag (CTF) exercises, Certified Ethical Hacker and Certified 
Penetration Tester exams, taught by an expert with years of real pen testing experience.

http://www.infosecinstitute.com/courses/ethical_hacking_training.html
------------------------------------------------------------------------


Current thread: