Get a Pentest and security assessment of your IT network.

Cyber Security

Detecting VPN Use

TL;DR

Yes, a system administrator can often detect if someone is using a VPN, but it’s not always foolproof. Methods include checking IP addresses against known VPN server lists, analysing network traffic patterns, and looking for blocked ports or unusual DNS requests. The success depends on the sophistication of the VPN service and the administrator’s monitoring tools.

How System Administrators Detect VPN Use

  1. Check IP Address Reputation:
    • Administrators can compare a user’s public IP address against databases of known VPN server IPs. Many commercial services provide these lists (e.g., MaxMind GeoIP, IP2Location).
    • # Example using ipinfo.io (requires an account and API key)
      curl "https://ipinfo.io/<user_ip_address>>" | jq '.org'

      This will show the organisation associated with the IP address, which might indicate a VPN provider.

    • Be aware that these lists aren’t perfect and can have false positives.
  2. Network Traffic Analysis:
    • VPNs encrypt network traffic, making it harder to inspect the content. However, administrators can still look for patterns.
    • Consistent Destination IP: If all a user’s traffic is going to a single IP address (the VPN server), that’s suspicious.
    • Unusual Traffic Volume: A sudden increase in traffic to/from a specific IP might indicate VPN usage.
    • Port Usage: Some VPN protocols use specific ports. Monitoring for traffic on these ports can be helpful (e.g., OpenVPN often uses port 1194). Tools like Wireshark or tcpdump can capture and analyse network packets.
      # Example using tcpdump to monitor port 1194
      tcpdump -i eth0 port 1194
    • DNS Requests: Look for DNS requests going through the VPN server.
  3. Firewall Logs and Blocked Ports:
    • If a firewall blocks certain ports commonly used by VPNs, logs will show attempts to use those ports.
    • Administrators can review firewall rules to see if any VPN-related traffic is being blocked.
  4. Proxy Server Detection:
    • If the organisation uses a proxy server, administrators can check logs for users bypassing it with a VPN.
    • Look for discrepancies between user IP addresses and their reported location.
  5. Deep Packet Inspection (DPI):
    • More advanced systems use DPI to analyse the content of network traffic, even when encrypted. This can identify VPN protocols.
    • This requires significant processing power and may raise privacy concerns.
  6. Endpoint Detection:
    • Some security software installed on user devices (endpoint detection and response – EDR) can detect the presence of VPN clients.
    • These tools often have signatures for known VPN applications.

Limitations

  • Strong Encryption: Modern VPNs use strong encryption, making it difficult to inspect traffic content without decryption keys (which administrators shouldn’t have).
  • Obfuscation Techniques: Some VPNs offer obfuscation features that hide their traffic patterns.
  • VPN Protocols: Using less common or custom VPN protocols can make detection harder.
  • Privacy-Focused VPNs: VPN providers focused on privacy take extra steps to avoid detection.
Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation