Ethical Hacking: Advanced and Effective Measures of Ethical Hacking by Elijah Lewis
Author:Elijah Lewis [Lewis, Elijah]
Language: eng
Format: azw3
Published: 2020-05-08T16:00:00+00:00
HTTPort
This can be used to bypass the HTTP proxy. With the HTTPort, some services can be used behind the HTTP proxy. These servers include e-mail, IRC, news, ICQ, AIM, FTP, and any SOCKS-capable software. The main reason for this is for the user to be able to set up Internet software such that it considers the PC that is to be used. HTTPort uses a method called tunneling to intercepts connection from this software and run this connection through the proxy. Setting up the software with the HTTP port can be done using any of these two ways.
If the software uses a small range of fixed port or a single port with a single or small range of fixed servers, the software can be used to connect to some.server.com:some_port. New HTTPort mapping has to be created with any local port (preferably above 1023), remote server of some.server.com, and remote port of some port. The software should be pointed to 127.0.0.1: mapped_local_port as if it was the original server it needed.
If SOCKS4 proxy can be used to connect the software, the software should be pointed to 127.0.0.1:1080, which is a built-in HTTPort SOCKS4 server.
HTTPort makes it possible to open the client side of a TCP/IP connection and provide it to any software. “Client” means that HTTPort may not be used for Trojans, like NetBus or BackOrifice, because HTTPort cannot make a listening server side of a TCP/IP connection available for connection from the outside, which could possibly be exploited by Trojans. This, in turn, means that HTTPort may be utilized by client type software only, not server type. “Any software” indicates that any other software may use the same technique that HTTPort does to perform exactly the same thing. Moreover, the client-side of the malicious software may use plain HTTP to access a remote malicious server.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7791)
Grails in Action by Glen Smith Peter Ledbrook(7705)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6424)
Kotlin in Action by Dmitry Jemerov(5074)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3855)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3093)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Art Of Deception by Kevin Mitnick(2613)
Drugs Unlimited by Mike Power(2475)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2361)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2317)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2269)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2267)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2197)
JavaScript by Example by S Dani Akash(2141)
DarkMarket by Misha Glenny(2086)
Wireless Hacking 101 by Karina Astudillo(2082)
Hands-On Cybersecurity with Blockchain by Rajneesh Gupta(2003)
