How to Bypass Web-Proxy Filtering

Summary

This article from Black Hills Information Security discusses methods for creating command and control (C2) channels within environments that employ restrictive egress filtering. It addresses the challenges testers face when attempting to establish such channels under these conditions.

IFF Assessment

FOE

This article details techniques that can be used to bypass security controls, which is detrimental to defenders.

Defender Context

Understanding how attackers bypass web proxy filtering is crucial for defenders to strengthen network egress controls and detect C2 traffic. Organizations should review their proxy configurations and consider advanced threat detection mechanisms to identify and block such bypass techniques.

Read Full Story →