Chapter 11. Network Tunneling

“All that is required is the ingenuity . . .”

—daemon9, coauthor of Loki1

Network tunnels are methods of encapsulating traffic in different types of protocols. Although the concept of tunneling sounds sneaky, network tunnels are often used for legitimate purposes, such as aggregating network traffic across switched virtual circuits. In certain circumstances, network tunnels are used to provide a layer of encryption for data in transit. Tunnels can also be used for illegitimate purposes, in order to hide content in ways that firewalls and NIDSs are not instrumented to detect or prevent.

In this chapter, we explore the inner workings of network tunnels, what they are used for, and how to detect and dissect them. We ...

Get Network Forensics: Tracking Hackers through Cyberspace now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.