Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

Tunneling through server

Name: Zesty 2006-02-22 10:32

damn, couldn't think of a good title for this thread to draw the right attention.. ah well, we'll see what happens.

soooo, I'm working somewhere where we've got a big network, run by redhat bladi bladi blah. the NCOIC is rather stubborn about letting fun things be done with the internet, ((interpret that how you want..)) and makes it known that we'll get some kinda trouble if we do anything outside of what we're supposed to.

naturally, that's no fun.

so, the question is, is there any way to mask, to the server, where I'm going on the web? I was thinking some kind of tunnel to have it so my IP reaches the net, but everything is masked under the visage of the tunnel.. any one know a solution to this trouble? you'd make a long deployment way shorter if you did. :)

thanks in advance, If someone wants more info on the network, I'm sure I can get it, and I'm also aware that this might be impossible, sinse, well, everything has to go through the server to get to me. wee for technology. :)

thanks again!
                                                  -Z

Name: Anonymous 2006-02-22 19:47 (sage)

Go away

Name: Anonymous 2006-02-23 12:28

lol completely impossible.
certainly can't use ssh port forwarding to a machine running a proxy and then use that port and localhost on your box, nope. completely fucking pimpossible.

Name: Anonymous 2006-02-23 17:15

>>3
Signed.

Although you don't even need to run a proxy if you set it up right.

Name: Anonymous 2006-02-24 3:37

http://tor.eff.org/

distributed proxy network with encryption, supports arbitrary protocols

enjoy

Name: Anonymous 2006-02-24 21:09

>>5

Its quicker to fucking treck by elephany than send/receive data with tor.

Name: Anonymous 2006-02-24 23:05

>>6

Convenience must always be sacrificed for any increase in security.

Name: Anonymous 2006-02-25 11:09

Why is it that whenever there are questions about circumventing the established system jerks like >>2 appear?

Name: Anonymous 2006-02-25 12:17

>>8

Because this place is full of trolling retards?

Name: Anonymous 2006-02-25 13:01

>>9
Or rather, no one is afraid of telling the truth.

Name: Anonymous 2006-02-25 16:42

>>3
works fine here :\

Name: Anonymous 2006-02-25 22:51

Generally, in big networks, I've found ports 443 (HTTPS) and 563 (NNTP over SSL) are generally open, and because they're secure the data isn't usually monitored. Of course, the remote host will be tracked, so you could make a server at home, register some nice sounding DNS (www.THISURLISWORKRELATEDLOL.org), redirect there and use that to proxy all your traffic.

Oh, sorry, what I meant to say way ZOMGNEWB DO UR WORK LOL FAG U FAIL AT INTERWEEABOO!!!1111eleventybillion.

Name: Anonymous 2006-03-16 15:47

wow, I didn't think I'd get even the first response, let alone some helpfull ones. thanks all, I'll see if i can get some of these things to work. the setting up external server will probably have to wait 'til leave to to.. but it just might work.

sorry for the crazy bump

Name: Anonymous 2006-03-16 15:58

edit: to clarify, I knew there were capable people here to answer, just wasn't sure I'd get them

thanks again

Don't change these.
Name: Email:
Entire Thread Thread List