Skip to main content

An encrypted connection is established first before any HTTP requests are performed (e.g. GETGET, POSTPOST, HEADHEAD, etc.), but the hostname and port are visible.

There are many other ways to detect which sites you’re visiting as well, for example:

  • your DNS queries (i.e. they’ll see the IP request for secure.logmeinexample.com)
  • via network monitoring (e.g. netflow, IP to IP sessions, sniffing, etc.)
  • if the device you are working on is owned by the company and they have administrator access/privileges to view anything on the device (e.g. view your browser caches)

A popular way to evade a websenseWebsense proxy is to first establish a connection (viavia HTTPS:) to an outside proxy (e.g. https://proxy.org/) and make your request from there.

An encrypted connection is established first before any HTTP requests are performed (e.g. GET, POST, HEAD, etc.), but the hostname and port are visible.

There are many other ways to detect which sites you’re visiting as well, for example:

  • your DNS queries (i.e. they’ll see the IP request for secure.logmein.com)
  • via network monitoring (e.g. netflow, IP to IP sessions, sniffing, etc.)
  • if the device you are working on is owned by the company and they have administrator access/privileges to view anything on the device (e.g. view your browser caches)

A popular way to evade a websense proxy is to first establish a connection (via HTTPS:) to an outside proxy (e.g. https://proxy.org/) and make your request from there.

An encrypted connection is established first before any HTTP requests are performed (e.g. GET, POST, HEAD, etc.), but the hostname and port are visible.

There are many other ways to detect which sites you’re visiting as well, for example:

  • your DNS queries (i.e. they’ll see the IP request for secure.example.com)
  • via network monitoring (e.g. netflow, IP to IP sessions, sniffing, etc.)
  • if the device you are working on is owned by the company and they have administrator access/privileges to view anything on the device (e.g. view your browser caches)

A popular way to evade a Websense proxy is to first establish a connection via HTTPS to an outside proxy (e.g. https://proxy.org/) and make your request from there.

logmein word fix
Source Link
Tate Hansen
  • 13.8k
  • 3
  • 44
  • 84

An encrypted connection is established first before any HTTP requests are performed (e.g. GET, POST, HEAD, etc.), but the hostname and port are visible.

There are many other ways to detect which sites you’re visiting as well, for example:

  • your DNS queries (i.e. they’ll see the IP request for secure.loginmeinlogmein.com)
  • via network monitoring (e.g. netflow, IP to IP sessions, sniffing, etc.)
  • if the device you are working on is owned by the company and they have administrator access/privileges to view anything on the device (e.g. view your browser caches)

A popular way to evade a websense proxy is to first establish a connection (via HTTPS:) to an outside proxy (e.g. https://proxy.org/) and make your request from there.

An encrypted connection is established first before any HTTP requests are performed (e.g. GET, POST, HEAD, etc.), but the hostname and port are visible.

There are many other ways to detect which sites you’re visiting as well, for example:

  • your DNS queries (i.e. they’ll see the IP request for secure.loginmein.com)
  • via network monitoring (e.g. netflow, IP to IP sessions, sniffing, etc.)
  • if the device you are working on is owned by the company and they have administrator access/privileges to view anything on the device (e.g. view your browser caches)

A popular way to evade a websense proxy is to first establish a connection (via HTTPS:) to an outside proxy (e.g. https://proxy.org/) and make your request from there.

An encrypted connection is established first before any HTTP requests are performed (e.g. GET, POST, HEAD, etc.), but the hostname and port are visible.

There are many other ways to detect which sites you’re visiting as well, for example:

  • your DNS queries (i.e. they’ll see the IP request for secure.logmein.com)
  • via network monitoring (e.g. netflow, IP to IP sessions, sniffing, etc.)
  • if the device you are working on is owned by the company and they have administrator access/privileges to view anything on the device (e.g. view your browser caches)

A popular way to evade a websense proxy is to first establish a connection (via HTTPS:) to an outside proxy (e.g. https://proxy.org/) and make your request from there.

Source Link
Tate Hansen
  • 13.8k
  • 3
  • 44
  • 84

An encrypted connection is established first before any HTTP requests are performed (e.g. GET, POST, HEAD, etc.), but the hostname and port are visible.

There are many other ways to detect which sites you’re visiting as well, for example:

  • your DNS queries (i.e. they’ll see the IP request for secure.loginmein.com)
  • via network monitoring (e.g. netflow, IP to IP sessions, sniffing, etc.)
  • if the device you are working on is owned by the company and they have administrator access/privileges to view anything on the device (e.g. view your browser caches)

A popular way to evade a websense proxy is to first establish a connection (via HTTPS:) to an outside proxy (e.g. https://proxy.org/) and make your request from there.