Socks5 that will be able to see the admin?

Hello!
We began selectively to some employees to show that those sitting on the Internet does not work.
I'm sure some centralized system for logging and traffic analysis no. Then watch the traffic of a specific employee, if you have questions for him.
Actually, the question itself. I have set up a socks5 proxy and let the traffic through this proxy. I understand that the administrator will be able to see only what is on my computer is some kind of encrypted traffic on the ip of the proxy server and everything? Where I go he can not see, right?
June 10th 19 at 15:03
11 answers
June 10th 19 at 15:05
Socks5 over ssh will do.
But don't you think that the use of proxy or similar solutions will only attract attention to you?
Socks5 over ssh

Automatically obtained encrypted?
In this case, you must also configure DNS on this server, right? Otherwise DNS will be queried explicitly domain with local DNS, and then only are to submit the request soxu. What a conspiracy :) - Brady31 commented on June 10th 19 at 15:08
Yes maybe anything. Even screenshots every five minutes. TSU is not on working time walk on unnecessary sites. - Lonie.Batz commented on June 10th 19 at 15:11
DNS is UDP traffic. Judging by the description socks5, it has support for UDP. Then the question - why to configure dns?
Check it out (in an "open" or not go DNS queries) can be quite simple - put a tcpdump on the network interface, and will ship in chrome a thread on the site (preferably random from the search engine to avoid the discharge data cache). Then otkryvaem dump Sharq and Delaey a keyword search (domain. name). - letitia.Mraz commented on June 10th 19 at 15:14
June 10th 19 at 15:07
I understand that the administrator will be able to see only what is on my computer is some kind of encrypted traffic on the ip of the proxy server and everything?
No, not right.
Admin can see where you go, and through which proxy. What traffic should be encrypted?
And even if you coded what?
Admin can see where you go, and through which proxy. What traffic should be encrypted?

How the administrator can see goes to the user under the socks5? Have you seen the traffic socks5? All packets are encrypted(ssl) on a single IP address.

And even if you coded what?

Like what? No dns, no http headers when you request a web resource - what criteria will filter out parasites? In the analysis of the dump will be only the understanding that the employee does not want to be "listened to". And only for this reason, questions may arise on the part of leadership, not because of visited resources. - Brady31 commented on June 10th 19 at 15:10
,
How the administrator can see goes to the user under the socks5?
In the logs view.
Have you seen the traffic socks5?
Saw what?
All packets are encrypted(ssl) on a single IP address.
It is unclear how this will prevent the admin? Why would he want to see encrypted traffic, if you can see unencrypted?

Like what? No dns, no http headers when you request web resources
Why not? - Lonie.Batz commented on June 10th 19 at 15:13
June 10th 19 at 15:09
An encrypted VPN or ssh tunnel and only will be seen that there is some traffic to some IP, the specific sites you visit to know is impossible.
PS if office PC, then harder.
Specific sites will be scorched in the dns if it is configured on the local server that is often the case :) - Brady31 commented on June 10th 19 at 15:12
June 10th 19 at 15:11
I'm pretty sure that there is no special software we have

It maaaaate!

Is logged, as you know - all :) Here You question on the toaster sent - and the admin has is its text :) not joking, by the way :) is logged is not admin, the admin can maximum the console control stand is logged on the server. And stored as long as necessary. What is logged? Yes, all :) When I logged in, when I came out, what programs are launched, what search queries were entered, what sites went (with input interception), from whom and to whom letters were written, as the messenger spoke, what files are created-removed... Oh, and the desktop screenshots every 10 minutes...

Here you see even on a proxy to watch is not necessary, although there is a separate "puzomerka" is. And admin, when prompted, will be able to recover any working day within the aquifer storage...

No, it's not a "black science fiction". This is the real, existing system of monitoring users. I will not name to is not reproached.
Here You question on the toaster sent - and the admin has is its text :)

The HTTPS channel is the same. It is only if Tolkalina sniffers are. Which is doubtful. - Brady31 commented on June 10th 19 at 15:14
All of these features I know. And this crap our admins do not suffer exactly) - Lonie.Batz commented on June 10th 19 at 15:17
fucking the agent with the company captures keyboard input - just what I was HTTPS? I said - "the violinist is not necessary", that is, the statistics proxy options to the user himself and his superiors could see where he went. And to whom it is necessary, the data are collected direct from the company. - letitia.Mraz commented on June 10th 19 at 15:20
O sancta simplicitas! Although it vazomyne, You have your own sources of information about the admins :) - letitia.Mraz commented on June 10th 19 at 15:23
June 10th 19 at 15:13
Julia, you are a real hero if you managed to configure socks5. Many user are not even aware of how it works.
Now I add, you guys are right, what is logged depends on the requests of the leadership and the straightness of hands of the administrator.
If you want to sit where you want, so this one does not know - you are to work personal laptop, with personal Internet, if it is good from the authorities.
June 10th 19 at 15:15
Start with the fact that Julia is actually Julius.
the account is a fake one. the girls often help.

Second and most importantly , not typical behavior, to quickly calculate the offender.

third. say thank you the next verifier features and block.

The more display options bypass, the more block.
Your role is a tester, and sooner or later ends.

Always rejoice in the emergence of such employee. Enough two views of monitoring.
And mentally applauded another verifier of the wall.
what? are you a fool?) - Brady31 commented on June 10th 19 at 15:18
June 10th 19 at 15:17
Need a vpn, a proxy will not save.
Than in this case, the VPN different from the proxy? :) VPN and is used as a proxy :) - Brady31 commented on June 10th 19 at 15:20
June 10th 19 at 15:19
The Tor Browser. The administrator will be pleasantly surprised. But to get not if not caught red-handed.
Funny. The administrator will be pleasantly surprised to find that using a rule that blocks access to well known root nodes, the Torah went to the traffic! And how this will be happy SAT! - Brady31 commented on June 10th 19 at 15:22
I would fell into the sediment, if past AppLocker someone was able to run tor) - Lonie.Batz commented on June 10th 19 at 15:25
I have a girl called in helpers:) I like it, it seems you will soon, because the number of people grows, and I'm not :D Well, first would have had the greatest Bank educational work, and then called. Recruited tipo :D As Jim di Gzira in the "Steel rat" :D - letitia.Mraz commented on June 10th 19 at 15:28
But to get not if not caught red-handed.

.. in child porn? :) - letitia.Mraz commented on June 10th 19 at 15:31
Thor I used to work with. so the boss looks at it normally) - earl.Weissnat commented on June 10th 19 at 15:34
June 10th 19 at 15:21
Maybe then for personal surfing using the phone?
You can open the access point and use a personal channel to have absolutely no one dug.
June 10th 19 at 15:23
Something I have a suspicion that the admin is watching not only the traffic, but simply be able to remotely log into your computer, see your screen, install/delete any program without your participation and everything else. Therefore, any program on your computer will not help.
For personal access use your smartphone/tablet/laptop with mobile Internet. Or find another job.
June 10th 19 at 15:25
Are you sure you will be able to properly configure? Even if we imagine that the admin can't access your PC, and you only need to hide what resources you visit - in this configuration you will burn down the first request, because before your browser through a proxy shows you a page with your desktop PC receives a request for resolving the name of your website in dns server controlled by the system administrator.

Find more questions by tags WindowsNetwork administrationProxyLinux