HTTP smuggling & splitting, and lots of talk about "big brother" watching

Discussion in 'privacy problems' started by CoolWebSearch, Jun 15, 2009.

Thread Status:
Not open for further replies.
  1. SystemJunkie

    SystemJunkie Resident Conspiracy Theorist

    Joined:
    Mar 3, 2006
    Posts:
    1,500
    Location:
    Germany
    Looks not promising, not comfortable and buggy afaik.

    No. No chance. 0. The packets attach themselves at the end of usual http traffic, sometimes they are embedded in different filetypes, kind of stego.

    One thing is sure, neither any software firewall can do that, nor any usual router will be able to block it.

    Firewall ip blacklisting, VPN/tunneling combined with very good proxies can limit their activities but not totally
    stop the "tao water", afaik.
     
    Last edited: Jun 18, 2009
  2. arran

    arran Registered Member

    Joined:
    Feb 5, 2008
    Posts:
    1,156
    not comfortable and buggy? well I don't find it buggy its quite a stable app.



    ok lets gets back to yours and pandlouk original statement.

    Specifically what type of security issue? are you saying it is able to plant a virus or trojan? can you elaborate more.
     
  3. SystemJunkie

    SystemJunkie Resident Conspiracy Theorist

    Joined:
    Mar 3, 2006
    Posts:
    1,500
    Location:
    Germany
    I am not sure if we mean the same thing, it was a sort of proxy manager but when I tested it (long time ago...) it crashed and made difficulties.

    That is a difficult story because it is not much talked about and it is highly specific likely the majority don´t know that it exists. It is no visible virus or trojan it is so damn subtle, probably it will only appear in ram, usually nobody will notice it, except when they test new poc´s of their "matrix system". The whole system works in kind of viral stream packets.

    It is not known if these effects are part of it but several people noticed the same: Sometimes it has sideeffects you see some tiles at top of your browser or when you play a game and everything freezes, the tiles also appear in game hangs. That is what people call the malicious bios script. It is assumed that this script is used as os independent control mechanism. You should also check ACPI and Malware topic of searching several people see connections here.

    It re-acts like a moody beast, imho it is also able to breach security setups, I would go that far that it is one of their trainings to destroy latest firewall setups of citizens. But it doesn´t happen regular, it is a irregular thing, like waves in the ocean. Not really predictable.

    The latest issue of this moody control monster is at best described by Searching, I have a similar issue on one system:
    This is a very present attack poc of them, in this case specifically for windows systems as it seems.

    It is a ACPI fake temperature overkill issue that inevitably leads to auto shutdown on windows systems,
    it fakes the temp read out that in turn forces windows to shut down. Don´t ask me why they test this but it is the most recent attack and I guess it comes out of this global http-smuggling-eye.
     
    Last edited: Jun 18, 2009
  4. LowWaterMark

    LowWaterMark Administrator

    Joined:
    Aug 10, 2002
    Posts:
    18,278
    Location:
    New England
    SystemJunkie, you are doing it again! You are taking something that is real and extrapolating something totally unrealistic from it.

    HTTP smuggling & splitting are real types of attacks. They are in simplest terms ways of getting data to pass thru the protections of firewalls or other application defenses. They are not in and of themselves a form of malware.

    Getting data thru a firewall and getting it passed an application verification routine, on its own won't do anything. That data must still trigger some other form of infection or exploitation. These might include: corrupting contents of a cache server; injecting XSS exploits into user web accesses; causing buffer overflows in the applications themselves; or using any of the other normal infection vector.

    HTTP smuggling & splitting attacks are not magic. By assigning these unstoppable, supernatural powers to them, which many of your posts here are doing, you are grossly exaggerating their uses, and just spreading the most extreme form of FUD.

    And, all the stuff about a "global http-smuggling-eye" "a moody beast" and, of course "hidden groups and secret organizations' that globally have "some henchmans only some meters or some houses away from your home" is just way over the top! ("henchmans, some meters away from 'all of us', world-wide... How many millions of henchmans are on the payroll exactly? o_O )

    Any hope of talking about the actual, far less sensational and non-magical truths regarding HTTP smuggling & splitting, is totally lost in the paranoid conspiracy theorist non-sense posted in this thread.

    If people want to talk about the actual technical properties of these attack methods, start a new thread. But, stick to reality, not any of this global conspiracy, X-Files/Matrix-like, uber monitoring, hidden monster, new world order non-sense.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.