
X-VPN’s evasion techniques are based on using custom encryption of TCP and UDP payloads as well as mimicking other application layer protocols such as HTTP, SSL, FTP, NTP, and SMTP. The following section discusses evasion techniques found during our deep analysis of X-VPN. In such a case the end-user who is used as an exit node may be held responsible for any illegal activities other VPN users perform.Ĭonsidering the risks associated with VPNs, it is critical that network operators are able to monitor and control the usage of VPNs in their networks. Using the client as an exit node – VPN clients may allow its users to connect through an installed client of another end-user.Especially if VPNs use custom encryption, security monitors won’t be able to identify malicious payloads of incoming traffic. Risks of malware and spyware – VPN clients often access third-party sources and can infect the host with malware or spyware programs.Restricting traffic – Since a VPN provider has complete control over the data from its users, it can throttle or even block connections to various services or favor certain content providers over others.During our analysis of X-VPN we found that many exit nodes are located in different countries, which are often automatically selected by the VPN client. Jurisdiction of host-country – Depending where the VPN provider is located, the host country might require the VPN provider to share certain user data with the government.Can the VPN provider be trusted? – When using a VPN, all data from a client is sent to a third party who is able to perform various analysis and logging on the data.Users have to consider the following risks when they decide to use a VPN client:
#Vpn x client software
Using VPN clients such as X-VPN will put the user of such software as well as the network operator at risk.

As a consequence, protection systems are not able to inspect the data packets, which can allow malicious traffic to enter the network or sensitive information to leave network. X-VPN is currently one of the most evasive VPN clients, mimicking various popular protocols and services to bypass security policies. X-VPN is a type of Virtual Private Network (VPN) that can be used to bypass internet censorship and traffic policy enforcement points, which poses a great risk to network operators as well as VPN users. Researchers with Palo Alto Networks Unit 42 investigated the tunneling software X-VPN, which uses various evasion techniques to bypass security and policy enforcement mechanisms.
