SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsCompanies of all sizes spend large amounts of time, resources, and money to ensure that their network resources and Internet connections are not being misused. They hire the best Information Technology professionals, however, even the most technically challenged end user, with very little technical skills can find creative ways to circumvent firewall rules and bypass blocked websites. This paper will describe how an anonymizer or an anonymous proxy can bypass firewall rules and weaken the ability to enforce Confidentiality, Integrity, and Availability (CIA triad) in a network infrastructure. On the other hand, an anonymizer can be used for good, and is a useful way to hide IP addresses to surf the web anonymously.