Penetration Testing mailing list archives

RE: bypassing employer's proxy to surf anonymously


From: "Craig Wright" <cwright () bdosyd com au>
Date: Wed, 14 Jun 2006 06:55:17 +1000


Or to put my comment in again as I have on this topic numerous times over the years as it pops up.
 
Maybe the question should be rephrased from "how do I bypass the employer's proxy to surf anonymously?" to:
 
How do I breach the terms of my employment? 
How do I seek to bypass the controls that my company has put in place? 
How do I show that I can not be trusted?
How do I break systems rather than fixing or building them?
How do I show that I have low moral character?
How do I demonstrate that I should not be woirking in the security industry?!
 
The issue is not how to break it. but how to stop this. What controls will help? What montiroing and logs will be of 
use?
 
Craig

        -----Original Message----- 
        From: alan [mailto:alan () clueserver org] 
        Sent: Wed 14/06/2006 5:42 AM 
        To: Hubert Seiwert 
        Cc: gimeshell () web de; pen-test () securityfocus com 
        Subject: Re: bypassing employer's proxy to surf anonymously
        
        
         


Liability limited by a scheme approved under Professional Standards Legislation in respect of matters arising within 
those States and Territories of Australia where such legislation exists.

DISCLAIMER
The information contained in this email and any attachments is confidential. If you are not the intended recipient, you 
must not use or disclose the information. If you have received this email in error, please inform us promptly by reply 
email or by telephoning +61 2 9286 5555. Please delete the email and destroy any printed copy.  

Any views expressed in this message are those of the individual sender. You may not rely on this message as advice 
unless it has been electronically signed by a Partner of BDO or it is subsequently confirmed by letter or fax signed by 
a Partner of BDO.

BDO accepts no liability for any damage caused by this email or its attachments due to viruses, interference, 
interception, corruption or unauthorised access.

Current thread: