Page 3 of 3 FirstFirst 123
Results 21 to 30 of 30

Thread: Websense

  1. #21
    Super Moderator Archangel-Amael's Avatar
    Join Date
    Jan 2010
    Location
    Somewhere
    Posts
    8,012

    Default

    Quote Originally Posted by williamc View Post
    This isn't the sentiment I would expect from this forum. I don't know his exact circumstances, only that he is requesting help in bypassing a proxy filter.
    In that case he was given several examples of what to do.
    In my job of pen-testing, this is the first thing I do when I'm on-site. I don't want their IT people snooping on my browsing or seeing what tools I'm downloading.
    As such that is apart of your job. We would expect these types of actions.
    If I asked this very question I would hope to get an answer, not legal posturing and discouragement.
    He did and well you even gave one as well.
    I mean, he already said his superior has no problem with him bypassing it.
    No I am afraid that is not exactly what he said. For reference here it is again.
    Im not gonna loose my job by looking at remote exploit forum i work in 'it' and my boss has no problem with us browsing the net when its quite etc it just something thats is implemented 'above us' they like to waste money and be 'in control' so to speak - you'll prob here of this alot more though its getting quite popular ..oh and i found this both interesting and amusing

    The first part is "Im not gonna loose my job by looking at remote exploit forum.." is only his opinion nothing more. The "my boss has no problem with us browsing the net when its quite etc..." How are we to know or his boss for that matter what all websites he is looking at. And the consequences they could have on other things. Yeah, you and I know slim to none but that may not be the upper management view or else it would not be black-listed.
    Then there is the whole tone of "they like to waste money and be 'in control'..." bit, this sounds to me like someone as streaker69 pointed out as young and potentially just starting off in some sort of career. Now with as he mentioned the economy, what would be a better thing to do, a leave r-e alone until he gets permission. Or B. lose it due to some stupid rule violation about one website?

    I understand your sentiments williamc, but I would expect someone that is a pro, not to support the same ideas that a user potentially misusing company resources, is not the best interest of the company.
    To be successful here you should read all of the following.
    ForumRules
    ForumFAQ
    If you are new to Back|Track
    Back|Track Wiki
    Failure to do so will probably get your threads deleted or worse.

  2. #22
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by KingMidas View Post
    Was just after some info or greater knowlegde, think some people are staying up too late or getting old or both, i work hard in work and from time to time i browse the net, tell u what though some lazy bstrds do sod all most of the day`and are better payed so i'll b buggered if i work non stop. if we use ultra vnc for troubleshooting users remotely wouldn't think a connection to my home pc would stand out.
    Regardless of how hard you work, if your company has a computer usage policy and if you've agreed to that policy when you started working there, you should not be bypassing their controls that are in place.

    But hey, that's your choice, because most of the time, people doing such things eventually get caught, and get fired. NetAdmins have the responsibility of looking for people violating the rules, and they would be at fault if they didn't report people violating policies.
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  3. #23
    Member webtrol's Avatar
    Join Date
    Jan 2010
    Posts
    113

    Default

    When reading this subject I started to wonder how many security systems are compromised by well meaning people.

  4. #24
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by webtrol View Post
    When reading this subject I started to wonder how many security systems are compromised by well meaning people.
    Lots. "Well Intentioned people" can be the bane of our existence. Users seem to think that policies are put in place just to annoy them, and they fail to see that most policies are there to keep the network safe.
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  5. #25
    Super Moderator Archangel-Amael's Avatar
    Join Date
    Jan 2010
    Location
    Somewhere
    Posts
    8,012

    Default

    Quote Originally Posted by streaker69 View Post
    Lots. "Well Intentioned people" can be the bane of our existence. Users seem to think that policies are put in place just to annoy them, and they fail to see that most policies are there to keep the network safe.
    Absolutely, I would have to agree.
    And not only the network but the company it's self, their customers, and the "all mighty bottom line" or profits. I guess streaker some of these types of thought processes do come with time/age.
    To be successful here you should read all of the following.
    ForumRules
    ForumFAQ
    If you are new to Back|Track
    Back|Track Wiki
    Failure to do so will probably get your threads deleted or worse.

  6. #26
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by archangel.amael View Post
    Absolutely, I would have to agree.
    And not only the network but the company it's self, their customers, and the "all mighty bottom line" or profits. I guess streaker some of these types of thought processes do come with time/age.
    Time/Age yes, but also with your responsibilities as well. When you're the one that's gotta fix the stuff that well intentioned Lusers break, then you try to mitigate what they can break.

    Of course, then you get the Lusers that try to pass blame for their own idiocy on someone else. I'm sure you've heard it, they claim that the Admins should have protected them better and it's the admins fault that they went to a site in at www.fsckmehrd.ru and executed some nasty 0day on themselves. Even though they found some method of bypassing the controls that were in place.

    I've played this cat & mouse game with one user at my site, he's no longer working for us either.
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  7. #27
    Moderator theprez98's Avatar
    Join Date
    Jan 2010
    Location
    Maryland
    Posts
    2,533

    Default

    Quote Originally Posted by streaker69 View Post
    ...they went to a site in at www.fsckmehrd.ru and executed some nasty 0day...
    Sorry, 'www.fsckmehrd.ru' does not exist or is not available.
    Did You Mean: real estate, fsck mehrd

    "\x74\x68\x65\x70\x72\x65\x7a\x39\x38";

  8. #28
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by theprez98 View Post
    Sorry, 'www.fsckmehrd.ru' does not exist or is not available.
    Did You Mean: real estate, fsck mehrd

    Yes, yes I did.
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  9. #29
    My life is this forum thorin's Avatar
    Join Date
    Jan 2010
    Posts
    2,629

    Default

    Quote Originally Posted by KingMidas View Post
    Anyway it has started tightening up on what people view and blocking more and more and lo and behold it has blocked Remote exploit forums

    So i installed logmein which is a remote desktop style server client on my laptop at home and left it on. I then logged into it from work and there i was on my home laptop, i clicked my explorer icon and voila remote exploit forum access. Now in work we use WINVNC to trouble shoot user problems etc so im gonna set this up (i personaly havent used it) anyways i was suprised to see that there was nothing found under 'websense' on the forums ie no one else has had similar trouble - so any 1 had dealing with it or know any interestin stuff bout it ?
    "no one else has had similar trouble" what trouble are you talking about? It's working as intended.
    I'm a compulsive post editor, you might wanna wait until my post has been online for 5-10 mins before quoting it as it will likely change.

    I know I seem harsh in some of my replies. SORRY! But if you're doing something illegal or posting something that seems to be obvious BS I'm going to call you on it.

  10. #30
    Junior Member
    Join Date
    Jan 2010
    Posts
    42

    Default

    Sorry all, but i think that maybe some are forgetting that not all of the people reading remote exploits forums are living in the US or in any other country in which company policies are intended to be followed "to the ground" under menace of termination.
    For instance, here in italy employees surfing control is strictly forbidden. Companies are obviously allowed to put in place any kind of url filtering they want, but they cannot "pinpoint" these filters on specific employees, nor they can check who is watching what. Moreover, it's not considered illegal at all to surf news or personal websites during working hours, since local supreme court has stated that "sporadic or moderated use of company's IT systems for personal purposes cannot lead to disciplinary actions or termination". This ends to the fact that net admins are allowed to check if a policy is working or not, but they cannot neither check nor tell who is overriding this policy until it leads to a crime or company loss. In these cases a local court act telling them to store records of surfing activity referred to a specific employee can be issued...
    In fact, local laws tells that it's not illegal to override url filtering during working hours and using company's IT systems for personal purposes unless it is proven that such an activity has effectively caused a loss to the company itself or can be prosecuted as a crime...
    Obviously, an employee must adhere to a "Company IT systems usage policy", but this statement falls under direct control of his activity, which means that a user can be appointed for breaking company policies only if he's personally caught while doing it or if his computer looks intentionally damaged or not funcional due to unapproved software installations...
    At the final end: local laws assumes that a business company can do everything wants to prevent unapproved internet surfing but they cannot monitor user's activity remotely, therefore if a user knows how to override company policies and it does, it's a company fault, not an employee breakout...I know it may sound strange, but that's how it works...

Page 3 of 3 FirstFirst 123

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •