Using ICMP tunneling to steal Internet

You connect to a open access wireless network. You are prompted with some sort of authorization page when you open a browser, but you can easily ping external hosts. You don’t have authorization for TCP or other traffic, so what do you do? Tunnel! This article explains the basics of ICMP tunneling, and how it works.

read more | digg story