Have an account?
It looks like you're new here. If you want to get involved, click one of these buttons!
Apply for Membership
Who's Online (1)
Looking to introduce yourself? Look no further, and click here! We also have IRC! [irc.evilzone.org #iexploit]
Can some one explain the logic behind this?
I am trying to understand the logic behind this technique,
I had seen some sites ,when ever we try to access their e-mail service via a proxy connection( mostly via proxy web-sites) they are refusing it,is there any change in the http packets?
how this detection is possible?
Also i heard some sites even detect the users who are logging or visiting their sites with vpn,but i don't know how it is possible?
can it be identified by looking in to the inbound packet structure?
i want to understand the logic behind this detection,if possible can some one explain the logic please?
There are transparent, anon and elite proxys, if your using transparent or anon they can tell your using a proxy if your using Elite they cant.
ok bro,how about detecting vpns?
possible or not?
couldn't one detect a VPN simply by looking for the GRE header or IPSEC data? almost any VPN uses this tunnel technique
No bro just think,you can see those headers between you and your vpn server,not between the vpn servers and the destination servers,hope you got my point,...
Add a Comment