This paper aims to recognize the similarities between existing tunneling solutions and gives advice on possible framework implementation. The reference implementation can be found on Github under the name of XFLTReaT. With this framework it is possible to use only one tunneling program to use different transport protocols to tunnel data. This approach can help on both sides of the IT-security industry to implement new attack and defense scenarios.
%0 Journal Article
%1 mjs:Bucsay:XFLTReaT
%A Bucsay, Balazs
%D 2019
%K bypass_techniques ds19 editor ethical_hacking malware mjsarticle penetration_testing red_team web_application_firewalls
%N 1
%P 927-937
%T XFLTReaT
%U http://www.sicherheitsforschung-magdeburg.de/uploads/journal/MJS_062_bucsay_XFLTReaT.pdf
%V 17
%X This paper aims to recognize the similarities between existing tunneling solutions and gives advice on possible framework implementation. The reference implementation can be found on Github under the name of XFLTReaT. With this framework it is possible to use only one tunneling program to use different transport protocols to tunnel data. This approach can help on both sides of the IT-security industry to implement new attack and defense scenarios.
@article{mjs:Bucsay:XFLTReaT,
abstract = {This paper aims to recognize the similarities between existing tunneling solutions and gives advice on possible framework implementation. The reference implementation can be found on Github under the name of XFLTReaT. With this framework it is possible to use only one tunneling program to use different transport protocols to tunnel data. This approach can help on both sides of the IT-security industry to implement new attack and defense scenarios.},
added-at = {2021-09-19T18:42:17.000+0200},
author = {Bucsay, Balazs},
biburl = {https://www.bibsonomy.org/bibtex/2b76d5ddbfd3e2d9ad94c7a7d345e597e/steschum},
interhash = {1cb2db98abe64b8b39ea44820b7f966e},
intrahash = {b76d5ddbfd3e2d9ad94c7a7d345e597e},
issn = {2192-4260},
journaltitle = {Magdeburger Journal zur Sicherheitsforschung},
keywords = {bypass_techniques ds19 editor ethical_hacking malware mjsarticle penetration_testing red_team web_application_firewalls},
language = {EN},
number = 1,
pages = {927-937},
subtitle = {Unified Tunneling},
timestamp = {2021-10-22T17:15:30.000+0200},
title = {XFLTReaT},
url = {http://www.sicherheitsforschung-magdeburg.de/uploads/journal/MJS_062_bucsay_XFLTReaT.pdf},
urldate = {2019-05-11},
volume = 17,
year = 2019
}