-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Here is a page which has some useful information about this: http://www.peacefire.org/bypass/Proxy/ also you can try the akamai cache method: http://www.peacefire.org/bypass/Proxy/akamai.html or you can try the old faviourite of encoding the IP address of the destination in decimal or whatever... You can additionally use the google.com cache of some content.... It depends as to how stealthy you want to be. I'm sure there are about a million ways other than this to do it... - -----Original Message----- From: Penetration Testers [mailto:PEN-TESTat_private]On Behalf Of francois RAYNAUD Sent: 25 April 2001 12:58 To: PEN-TESTat_private Subject: [PEN-TEST] websence bypass ? hi folks, while doing a penetration testing for my company, they ask if i could test Websence, which is a url proxy filter. Does somebody has any idea how to bypass it from the inside ? please no answer with the traditional "change your proxy !" cheers ===== François Raynaud England \!/ (@ @) mobile 0044 (0)7754 749971 ----oOO-(_)-OOo-------- ___________________________________________________________ Do You Yahoo!? -- Pour faire vos courses sur le Net, Yahoo! Shopping : http://fr.shopping.yahoo.com -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com> iQA/AwUBOudE+FKMcg0VZCu/EQIFNQCg6rbnfIK+KS+EZ9SJuCv6mtw3WYoAoOLU 3U4iu851wPCbnPG1mExnKlJ3 =WFd4 -----END PGP SIGNATURE-----
This archive was generated by hypermail 2b30 : Wed Apr 25 2001 - 16:23:52 PDT