Go Back   Computer Forums > General Computing > Cyber Safety and Computer Security
Click Here to Login
Join Computer forums Today


Reply
 
Thread Tools Search this Thread Display Modes
 
Old 04-19-2007, 09:30 AM   #1
BSOD
 
0x0161's Avatar
 
Join Date: Apr 2007
Posts: 441
Default Spoofing protocols

We all know websites/networks have applications that can detect when someone is using *TOR* (like snort for example) but is their a way to spoof the protocol(s) or use a protocol cleaner like program to assist with this? Not that Im trying to dodge any bypass content filtering systems, or run hidden services or anything like that but find this interesting.

All help is greatly appreciated, 0x0161
__________________

0x0161 is offline   Reply With Quote
Old 04-19-2007, 10:22 AM   #2
Daemon Poster
 
Steff's Avatar
 
Join Date: Sep 2006
Posts: 1,435
Send a message via MSN to Steff
Default Re: Spoofing protocols

sure
__________________

__________________
hi, i like eggs.
Steff is offline   Reply With Quote
Old 04-19-2007, 11:04 AM   #3
BSOD
 
0x0161's Avatar
 
Join Date: Apr 2007
Posts: 441
Default Re: Spoofing protocols

Quote:
Sure

Ummm, with TOR you don't need to spoof the protocols," to bypass content filtering systems or proxy filters, because TOR can do that by it's self.

With hidden services though more configuration is neccessary to make it run/work.


I just want to know if theirs such a method? I know theirs IP Spoofing, MAC Address Spoofing, DNS spoofing etc... but what about protocol spoofing?
0x0161 is offline   Reply With Quote
Old 04-19-2007, 11:23 AM   #4
Daemon Poster
 
Starr's Avatar
 
Join Date: Apr 2005
Posts: 926
Send a message via AIM to Starr Send a message via MSN to Starr
Default Re: Spoofing protocols

I'm pretty sure all we are allowed to say on topics like this is, "Google is your friend."
__________________
AMD Athlon 64 3200+ Venice Core, MSI K8N Neo-4, 2x 512 Corsair Dual Channel, Nvidia Geforce fx 6600 256MB, 160GB HardDrive

Windows Vista Business Edition

"There are 10 types of people in the world. Those who know binary and those who don't."
Starr is offline   Reply With Quote
Old 04-19-2007, 06:46 PM   #5
BSOD
 
0x0161's Avatar
 
Join Date: Apr 2007
Posts: 441
Default Re: Spoofing protocols

Quote:
I'm pretty sure all we are allowed to say on topics like this is, "Google is your friend."
Topics like what? Im not asking for anything illegal here the question is pretty legit. but what about protocol spoofing? If so, post applications.

Google? I just want to know if anyone has any prior experince with this or recommend any applications for doing such a thing.
0x0161 is offline   Reply With Quote
Old 04-19-2007, 07:24 PM   #6
Golden Master
 
DJ-CHRIS's Avatar
 
Join Date: Apr 2006
Posts: 5,203
Send a message via AIM to DJ-CHRIS Send a message via MSN to DJ-CHRIS Send a message via Yahoo to DJ-CHRIS
Default Re: Spoofing protocols

Yes you could hide one protocols information in another protocol. This is rarely ever done, however a few programs exist that do this. Azerus can encrypt it's traffic in order to bypass torrent blocks, as well as theirs a program to hide all TCP traffic inside of UDP packets.

However both you and the other computer need to support what you are doing. Besides trying to sneak information out of a network (Also even if unencrypted, modern packet sniffers wouldn't fully understand it), their is no real purpose of hiding a protocol inside of another protocol.
DJ-CHRIS is offline   Reply With Quote
Old 06-17-2007, 07:25 AM   #7
Daemon Poster
 
RewtGuy's Avatar
 
Join Date: Dec 2004
Posts: 595
Send a message via AIM to RewtGuy
Default Re: Spoofing protocols

Dunno if this answers your question or not but there's SFTP over SSH. Are you saying a protocol within a protocol? Or a program that pretends to be a protocol, as in takes incoming traffic / data and preforms as intended when it's not really?

Such as if SSHd wasn't running, but you had something else listening on port 22. I ssh in, authenticate, run commands, everything looks as if I were really running a shell when in reality I'm not?
__________________
Windows: A thirty-two bit extension and GUI shell to a sixteen bit patch to an eight bit operating system originally coded for a four bit microprocessor and sold by a two-bit company that can't stand one bit of competition.
RewtGuy is offline   Reply With Quote
Old 06-21-2007, 05:23 PM   #8
BSOD
 
0x0161's Avatar
 
Join Date: Apr 2007
Posts: 441
Default Re: Spoofing protocols

Quote:
Are you saying a protocol within a protocol? Or a program that pretends to be a protocol, as in takes incoming traffic / data and preforms as intended when it's not really?

Im saying if Im at work or school for *example*, and I want to use TOR to bypass content filtering systems, bypass proxies and host servers and I don't want SNORT or WEBSENSE to detect the *TOR protocol* is their such a program/tool? I know how the TOR protocols work and the specs for it.
__________________

0x0161 is offline   Reply With Quote
Reply

Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are Off



All times are GMT -5. The time now is 03:57 PM.


Powered by vBulletin® Version 3.8.8 Beta 4
Copyright ©2000 - 2017, vBulletin Solutions, Inc.
Search Engine Friendly URLs by vBSEO 3.6.0