| The proxy technology has been widely applied against the backdrop of constantdevelopment of network security technology. By deploying security devices like proxyserver at the network egress of headquarters and branches, many governmental,financial organizations and most of the large international corporations have achievedvarious monitoring and management of internet access from users in local network so asto enhance their intranet security.The proxy approach most widely used at present turns out to be the HTTP proxywhose normal authentication methods include anonymous authentication, basicauthentication as well as integrated authentication which chooses NTLM or Kerberosthrough negotiation. Communication of softwares in network environment mentionedabove therefore must pass the proxy authentication and the data pack should meet therequirements from HTTP protocol so that a normal external communication could occur,which results in serious influence on and extreme impediment to the normalcommunication of relevant softwares. In view of this problem a study of fundamentalprinciples and authentication approaches is necessary to ensure a normal operation ofnetwork communication.Focusing on the issue above, the thesis takes the penetration technology ofauthenticated proxy as the main subject for research and, through a deep analysis of thefundamental principles and the internal operation mechanism of proxy technology,brings such a technology into realization. To be more specific, the thesis:1. carries out a detailed research of the fundamental principles and the operationmechanism of proxy technology, in which the HTTP protocol and the authenticationmechanism, method and process of common HTTP proxy are explored with emphasis.2. carries out a detailed research of the detect methods of proxy type, includinghow to get specific information of a proxy server like IP, proxy port, proxy type andauthentication approach.3. carries out a detailed research of the authentication protocol of HTTP proxy aswell as the authentication approach during communication. 4. carries out a detailed research of the acquisition method of proxy authenticationinformation, including how to get such information in data of local and internetcommunication.5. studies the encrypted tunnel technology and put it into practice, including how toutilize such a technology to penetrate authenticated proxy and achieve a normalcommunication. What’s more, it puts the findings into engineering realization.Proves the effectiveness of this method through tests. This method couldsuccessfully penetrate the HTTP proxy-authentication network which is constructedbased on protocols of anonymous authentication, basic authentication, NTLMauthentication and Kerberos authentication. |