asteroza + tcp   58

Tunnel WireGuard via Websockets – 𓀬 – Notes on various tech things
Novel TLS/websocket proxy bypass method to tunnel WIreguard through a corporate HTTPS proxy supporting CONNECT, assuming the DPI doesn't catch you...
wireguard  TLS  websocket  TCP  proxy  bypass  networking  VPN  tunnel 
9 weeks ago by asteroza
Shooting Rubber Bands At Firewalls
Uh, if this is correct, there will be some unhappy campers in in the small/medium business space...
firewall  DDoS  TCP  garbage  packet  security  hacking  pentesting 
may 2019 by asteroza
using custom TCP/IP stacks to assist bypassing UTM firewalls
custom  TCP  IP  stack  software  evasion  exfiltration  security  hacking  pentesting 
october 2018 by asteroza
Netcat 1.10 README
Some interesting history in the readme
security  hacking  pentesting  network  protocol  history  kernel  socket  TCP  UDP  ICMP  netcat 
july 2017 by asteroza
aploium/shootback: a reverse TCP tunnel let you access target behind NAT or fire...
python reverse tunnel, so python netcat/socat effectively, or you could just use ssh -R...
python  reverse  TCP  tunnel  VPN  Delicious 
february 2017 by asteroza
C++ framework that does some extreme things to achieve async performance
C++  programming  framework  async  development  user  mode  userland  TCP  stack  HTTP  high  performance  networking  network  software  opensource  Delicious 
september 2015 by asteroza
based on the Knock kernel patch for TCP SYN packet SQN based port knocking tokens.
IETF  draft  RFC  TCP  stealth  port  knocking  SYN  packet  SQN  security  network  protocol  Delicious 
august 2014 by asteroza
tcpcrypt - Home
Someone once suggested in the past of using TCP SYN or ACK packets filled with 46 bytes of payload as a sneaky way of hustling data, much like a UDP VPN. Though with anti-SYN flood defenses these days, that may no longer be practical...
networking  protocol  encryption  security  TCPcrypt  network  TCP  opportunistic  Delicious 
september 2013 by asteroza
iphone - ituneconnect using application loader behind a firewall - Stack Overflow 443 n/a 443* n/a 33001 33001-33500 33001 33001-33500 33001 33001-33500 33001 33001-33500 33001 33001-33500 33001 33001-33500 33001 33001-33500 33001 33001-33500 33001 33001-33500 33001 33001-33500 33001 33001-33500 33001 33001-33500 33001 33001-33500 33001 33001-33500 33001 33001-33500 33001 33001-33500 44001 44001-44500
upload  tricks  tips  sysadmin  networking  network  permission  firewall  range  port  IP  UDP  TCP  submission  app  iPad  iPhone  iOS  xcode  apple  Delicious 
november 2012 by asteroza
Sounds a little like they are pushing some link layer information up into the TCP stack, breaking the OSI model a little...
coded  TCP  forward  error  correction  data  link  algorithm  software  communication  Delicious 
october 2012 by asteroza
Named Pipe TCP Proxy Utility
neat little utility to allow telnet access to VMware named pipe serial consoles
NPTP  named  pipe  TCP  proxy  utility  windows  sysadmin  software  tools  utilities  programming  development  debug  freeware  VMware  serial  console  telnet  remote  access  Delicious 
november 2009 by asteroza

related tags

2K3  802.11  access  ACK  AJAX  algorithm  alternative  analyzer  android  antiIDS  antiIPS  antiscanning  API  app  apple  art  ASP  assessment  async  attack  audio  automatic  backend  balancer  bandwidth  BIOT  book  builder  bypass  C++  capture  case  channel  chart  cheatsheet  checksum  cipher  coded  coding  collector  communication  concept  connection  console  control  correction  corruption  count  counterscanning  custom  cutter  data  DDoS  debug  defense  definition  delayed  Delicious  desktop  development  diagram  diagrams  DNS  documentation  domain  DoS  draft  dragnet  drawings  Driftnet  eEye  emulation  encryption  error  ethernet  EtherPEG  evasion  eventID  exfiltration  false  FEC  file  filetype:pdf  filter  firewall  fix  forward  fragmented  framework  freeware  fronting  garbage  go  guest  guide  hack  hacking  half  handshake  HAProxy  header  high  history  howto  http  ICMP  IETF  illustration  image  images  incomplete  information  infosec  infrastructure  initiator  injection  internet  inverting  iOS  IP  iPad  Iperf  iPhone  iSCSI  java  JSP  kernel  key  knocking  latency  library  limit  limitation  link  linux  list  listener  load  lockless  lossy  LRO  machine  management  media:document  MeshCache  mic  microphone  MitM  mod  MODBUS  mode  modem  modification  modscan  monitoring  MPEG  multicast  named  netcat  network  networking  NPTP  number  obfuscated  obstcp  open  opensource  openVPN  opportunistic  optimization  OS  osx  outbound  overlay  packet  packit  patch  payload  penetration  pentest  pentesting  per-hop  performance  permission  PHP  picture  pictures  pipe  poor  port  ports  portscanning  portspoof  prgramming  privacy  problem  programming  proof-of-concept  protection  protocol  proxy  ProxyChains  python  range  RDP  receive  redirect  reDuh  reference  registry  remote  representations  research  reset  response  retransmission  reverse  RFC  routing  RSTEG  SCADA  scanner  scanning  script  secuirty  security  semantics  sequence  serial  SLOT  SMB  sniffer  sniffing  socket  Sockstress  software  sound  speaker  speed  spoofing  SQN  SSL  stack  stealth  steganography  stream  study  submission  sunray  symmetric  SYN  sysadmin  tcp  TCP/IP  TCPcrypt  tcpoverudp  telnet  testing  tips  TLS  tools  traceroute  transfer  transport  tricks  TSO  Tsunami  tuning  tunnel  tunnelign  tunneling  tutorial  tweaks  udp  ultrasonic  upload  user  userland  utilities  utility  virtual  virtualization  vista  visual  VM  VMware  VMXNET  VMXNET3  VPN  web  webdev  websocket  wifi  window  windows  wireguard  wiretapping  wrapper  xcode  XP  ZFS 

Copy this bookmark: