+++ to secure your transactions use the Bitcoin Mixer Service +++

 

Bugtraq mailing list archives

Re: SurfControl Bypass Vulnerability


From: Valdis Kletnieks <Valdis.Kletnieks () VT EDU>
Date: Mon, 26 Mar 2001 14:00:18 -0500

On Mon, 26 Mar 2001 06:01:48 PST, Ben Ford <bford () ERISKSECURITY COM>  said:
The idea of IP based penetration is also flawed, in that you'd get the
default domain of the box anyways.  Unless that default domain has an
index page to give you a choice of virtual hosts (and many/most don't),
you wouldn't be able to access the desired http://www.juicysex.com anyways.

Unless of course you find a way to get the Host: header set the way you
want, and the blocking software is only looking at the GET/POST/whatever
query.

Note that this may depend on the exact particulars of how the filter is
implemented, and may not be possible on a "standard" browser/filter
combination.  But it's *not* safe to assume that "they can't get there
because there's no index page".  That's just security-through-obscurity.
--
                                Valdis Kletnieks
                                Operating Systems Analyst
                                Virginia Tech

Attachment: _bin
Description:


Current thread: