Hi back,
this tool does not tunnel a firewall but any
http-proxy. Because anyone can setup his own host it is not a solution to block
the common known hosts. Also using content security is not a solution because
using of ssl can bypass this.
The only solution in my opinion is at the client.
You has to prevent the clients for installing it, but because the code is
available there are some problems. Anyone can hide it as another common process.
But a good chance is to use "netstat -a" at the
client and look for unknown services, but beware you have to do it local at the
client, because the tool binds only to localhost (127.0.0.1).
Any other possibilities for blocking this tool
?
best regard fitz
|