MANTICORE: Masking All Network Traffic via IP Concealment with OpenVPN Relaying to EC2

Download Now
Provided by: University of Alabama
Topic: Security
Format: PDF
Malware and computer forensic researchers often communicate with malicious servers, either directly or indirectly, through the web browser or other ports utilized by malicious software. Communication with this form of adversary can sometimes necessitate the use of a proxy server in order to conceal the true origin of the researcher's traffic. Open source projects such as openVPN currently offer a structured method for establishing software based Virtual Private Networks (VPNs) between arbitrary clients and servers. Likewise, paradigms exist which allow a user to proxy traffic from one end of a VPN to another, effectively masking the origin of traffic being sent to and from the client system.
Download Now

Find By Topic