The attacker may use this technique for the following reasons:
- It assures the attacker that no one will monitor him or her while browsing.
- It helps the attacker to bypass firewall restrictions.
- It ensures secure browsing.
- The attacker can hide his or her IP address from being trapped.
- It assures that it is highly impossible for others to identify attacker online.
tools : HTTP-Tunnel(http://http-tunnel.sourceforge.net)
GNU http-tunnel(http://www.nocrew.org/software/httptunnel.html)
댓글 없음:
댓글 쓰기