Wednesday, January 9, 2013

Elsevier Network Security : Abusing Glype Proxies

Update : 29th April 2014

Download : Paper available herehttp://www.slideshare.net/adityaks/abusing-glype-proxies-exploits-and-defences

Our paper on "Abusing Glype Proxies: Attacks, Exploits and Defenses" are out in Elsevier Network Security.

Abstract: Proxies play a critical privacy role because these are widely used for anonymous surfing and identity cloaking on the Internet. In addition, proxies also assist in traffic filtering, traffic management, log auditing, access policies and surfing restricted sites. There are several types of proxies available, but the Glype HTTP proxy is used extensively.
The Glype open-source HTTP proxy is used extensively. However, proxies can be transformed into attack platforms for exploitation. 


Enjoy!