BYPASS FILTERS....
1.Typing IP address instead of domain name
check out the site baremetal.com where you can look up the IP address of just about any site
a better approach is to ignore the IP/URL altogether and examine the data on the web page itself. This is a little more resource intensive, but far more effective. It's much more accurate since a web ite such as Google or Yahoo can call data from other sites
2: Finding a cached version
Search providers, like Google, cache websites on a regular basis - which basically means that they save a version of the site on Google's servers. You can navigate to a cached site in Google by clicking the 'cached' button after the search result and you are still at an address run by Google that may be unblocked.The strategy for the security department here is the same as with IP addresses: Disregard the URL and inspect the content itself
3: Hiding behind encryption
Entering HTTPS in front of the web address will often give you a stripped down version of the restricted site and can be used as another technique to gain verboten access.
"There is also SSH, encrypted SOCKS, all of these different alternative channels that masquerade as web traffic on not-so-intelligent network devices
, many companies are now opting to implement web proxies and gateways that allow this type of content to be analyzed by creating a pit stop along the way
4: Using proxy servers and other privacy-friendly tools
Employees can setup their browser so that their web queries go through an encrypted tunnel to an external server which may give them unrestricted online access.GhostFox, a Firefox browser extension, has a privacy bar just below the URL bar where users can select a proxy that is privacy friendly.
If the proxy server is unencrypted, then you can inspect the traffic and block either by blocking proxy connections at your firewall and/or by looking at web page content
There may be ways to fingerprint Tor with something like an Intrusion Detection System,
5: Using smartphones
"Devices such as Blackberries that are owned and managed by the business can be restricted through group policies and proxy servers, much the same way that laptops and desktops are,"
No comments:
Post a Comment