lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <475DB7D5.1000804@rogers.com>
Date: Mon, 10 Dec 2007 17:04:05 -0500
From: gmaggro <gmaggro@...ers.com>
To: Full Disclosure <full-disclosure@...ts.grok.org.uk>
Subject: Re: Captive Portal bypassing


> Even easier than running a
> special tool is to just setup SSHD or a proxy to listen on TCP 53.  You
> can then tunnel out and do as you please without authenticating to the
> captive portal.  
Not everyone has access to something listening on 53 that is ready to be
tunneled to. Nor is everyone clever enough to go about doing that sort
of thing.

We should have as a design goal convenience on such a level that someone
on the run could walk into a coffee shop or whatever, and as easy as
connecting to their home wifi, bypass the portal, then proceed to
initiate whatever communications they desire, afterwards leaving cleanly
and quickly.
> Of course you might want to keep the legal aspects in
> mind before doing any of that.
>   
Bah. Who cares about that. Our governments have proven they do not
respect the rule of law; why should we?

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ