O'Reilly logo

Learning Network Forensics by Samir Datt

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Smuggling Forbidden Protocols – Network Tunneling

 

"Tunnels have been the refuge of many a smuggler!"

 
 --Samir Datt

In the good old days (and even now), smugglers would need to ship foreign contraband (unauthorized products) across the borders without the border security forces or coast guard finding out. To do this, tunnels were commonly used.

The network world has startling similarities when it comes to shipping unsupported and unauthorized protocols across the network borders. This is done by the means of tunneling. In a nutshell, what a tunnel involves is encapsulating the unsupported (or unauthorized) protocol in the data portion of the IP datagram and then using the IP protocol to send it. Tunneling protocols work mostly at the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required