Hacking Out of a Network - Computerphile

236,490
0
Publicado 2021-08-27
Multiple ways to break through restrictions in a network* demonstrated by Dr Richard G Clegg of Queen Mary University London.

*Please only try these methods on machines where you have permission.

Richard has kindly prepared some notes: bit.ly/C_RichCleg_HackOut

www.facebook.com/computerphile
twitter.com/computer_phile

This video was filmed and edited by Sean Riley.

Computer Science at the University of Nottingham: bit.ly/nottscomputer

Computerphile is a sister project to Brady Haran's Numberphile. More at www.bradyharan.com/

Todos los comentarios (21)
  • @Bibelogram
    “Only do this at home” 1min later… “imagine you are in a train”…
  • @_..---
    "do not try this at home" "no, only try this at home", lmao, I am somewhat conflicted on this
  • @lawrenceplays
    Students are the best people to ask about how to bypass networks.
  • @cwtrain
    "Let's get the OHP up." Smacked me right back to elementary school.
  • @bsvenss2
    04:35 UFW is actually Uncomplicated Firewall . It's "only" a Python "wrapper" for iptables.
  • @IrrevocablyZoey
    I feel like this is how many kids get interested in computers.
  • I remember using proxy tunnels way back in the early 2000s. I found a bank in France that had full internet access and proxied in to that over port 8080.
  • @pv2b
    10:54 Unfortunately, this whole section here about TCP over TCP is incorrect in this case. Yes, if you're tunneling raw IP packets over TCP (and there are ways to do this with SSH, for instance using the -w option, running PPP over SSH, or with OpenVPN over TCP, as well as a million other ways), you do end up with the TCP-over-TCP meltdown you are explaining quite correctly. But, if you're using SSH's "dynamic port forwarding" mode which emulates a SOCKS proxy, there is no TCP over TCP at all going on. There's TCP running between your client software and the SSH client's SOCKS proxy emulator, TCP running between your SSH client and the remote SSH server, and also TCP running from the remote SSH server to the tunnel destination. These are all seperate TCP connections, and none of them of them running "over" each other. They're conseptually connected end to end, not over each other. There's no raw IP packets going over the SSH tnnel, and thus no TCP. Only the data beloning inside the stream as multiplexed as multiple channels in SSH. TCP retransmissions will happen on every TCP stream, but there's no redunant layer of TCP happening end-to-end over the actual tunnel, and no duplication of retransmission for that reason. That said, because everything you're doing ends up passing through a single TCP connection, that can definitely be a bottleneck, but for other reasons.
  • @JakeFlakes
    My professor 2 years ago tried to explain ssh tunneling for the same length of time as this video and failed miserably. Dr. Clegg explained in half the time and even talked about other ways of doing this while being easy to comprehend. Great video
  • @___________2204
    This format of screen-sharing is soooo much better than other videos. Please maintain this format of showing everything on the screen. So helpful and so much easier to understand
  • that's how network engineers are born.... trying to bypass censorship
  • @TimDunstan
    I did this years ago to get around my University's firewalls to play games online... :D
  • @scott5146
    I just run a VPN server at home, and anywhere I've been (including China) I can just VPN back home and get full normal access to everything.
  • @patrickjones9474
    One of the very few videos I have watched more than once. Please do more high quality content.
  • @eriksundell1400
    "try this at home but not anywhere else at all" ---> "so now let's imagine you're on a train or in an airport where the administrator is not giving you full access..." That escalated quickly.
  • @danijeltasov1432
    Yes, TCP over TCP is bad. But there is no TCP over TCP in this case. There are just 2 TCP connections in serial. If you use ssh -w, that would create a tunnel where you are doing tcp over tcp.
  • @MontyGeorgiev
    Really nice video. This is what inspires people. And then you introduce a NGFW with SSL and SSH decryption and loose all the magic.
  • @cakeman1715
    transmitting data as a subdomain to bypass a firewall is the most hacky janky thing I've ever heard of and I love it.