John has a proxy server on his network which caches and filters web access. He shuts down all unnecessary ports and services. Additionally, he has installed a firewall (Cisco PIX) that will not allow users to connect to any outbound ports. Jack, a network user has successfully connected to a remote server on port 80 using netcat. He could in turn drop a shell from the remote machine. Assuming an attacker wants to penetrate John's network, which of the following options is he likely to choose?
As long as you allow http or https traffic attacks can be tunneled over those protocols with Stunnel or HTTPTunnel.
Chaya
4 months agoGail
4 months agoGussie
4 months agoMerissa
4 months agoSheldon
5 months agoLatanya
5 months agoDiane
5 months agoLong
5 months agoKasandra
5 months agoKina
5 months agoArlie
5 months agoShaniqua
5 months ago