OSEC

Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email hr@neohapsis.com
[tool] Webtunnel 0.0.5

From: Janos Szatmary (jszatmaryusers.sourceforge.net)
Date: Tue Mar 17 2009 - 20:53:48 CDT


I'd like to announce the release of Webtunnel 0.0.5, available at http://sourceforge.net/projects/webtunnel
.

WHAT'S NEW

2009/03/17

     Added support for proxy auto-configuration
     Fixed a bug that would cause a keep-alive timeout to stop the
tunnel
     Fixed a fork handling bug to support ActivePerl's negative PIDs

ABOUT

Webtunnel is a network utility that encapsulates arbitrary data in
HTTP and
transmits it through a web server. In that regard, it is similar to
httptunnel,
however, it has several key important differences: its server
component runs in
the context of a web server as a CGI application (with optional
FastCGI support)
so it does not need its own port, and supports most things that the
web server
supports, such as authentication, HTTP 1.1, HTTPS, and client
certificates; it
uses simple requests and responses so it works seamlessly through
forward and
reverse proxies; it is multi-threaded (actually multi-process using
sockets for
inter-process communication) to allow multiple parallel connections to
multiple
destinations simultaneously.

EXAMPLES

To tunnel SSH traffic to your web server:

     wtc.pl tcp://localhost:8022 tcp://localhost:22 http://webserver/wts.pl
     ssh -p 8022 userlocalhost

To tunnel SSH traffic to some other server besides the web server:

     wtc.pl tcp://localhost:8022 tcp://sshserver:22 http://webserver/wts.pl
     ssh -p 8022 userlocalhost

To tunnel OpenVPN traffic through a web server running on a non-
standard port
and requiring authentication:

     wtc.pl \
         tcp://localhost:8194 \
         tcp://vpnserver:1194 \
         http://user:passwebserver:8000/wts.pl

To tunnel OpenVPN traffic through a web and proxy server both
requiring auth.:

     wtc.pl \
         tcp://localhost:8194 \
         tcp://vpnserver:1194 \
         http://user1:pass1webserver/wts.pl \
         http://user2:pass2proxyserver:8080

To tunnel Telnet traffic through a web server using client certs. for
auth.:

     wtc.pl \
         --cert client.crt \
         --key client.key \
         tcp://localhost:8023 \
         tcp://telnetserver:23 \
         https://webserver/wts.pl

To tunnel Telnet traffic through a web server with proxy auto-
configuration,
and the proxy server, if any, requiring authentication:

     wtc.pl \
         --pac \
         tcp://localhost:8023 \
         tcp://telnetserver:23 \
         https://webserver/wts.pl \
         http://proxyuser:proxypasspacserver:8000/proxy.pac

In most examples "https" is a valid alternative for "http".

------------------------------------------------------------------------
This list is sponsored by: InfoSec Institute

Learn all of the latest penetration testing techniques in InfoSec Institute's Ethical Hacking class.
Totally hands-on course with evening Capture The Flag (CTF) exercises, Certified Ethical Hacker and Certified Penetration Tester exams, taught by an expert with years of real pen testing experience.

http://www.infosecinstitute.com/courses/ethical_hacking_training.html
------------------------------------------------------------------------