Solved

Firewall Bypasser...

Posted on 2003-11-12
10
690 Views
Last Modified: 2013-11-16
Dear Friends,

     I just want to know about Firewall Bypasser Is it available in net for downloads? Send me the link where to download or any materials regarding this.

D.M
0
Comment
Question by:dm_oracle
  • 4
  • 3
10 Comments
 
LVL 31

Accepted Solution

by:
qwaletee earned 200 total points
ID: 9738019
http://www.http-tunnel.com

Allows connecting from inside your firewall to outside resources that your firewall does not nornally allow connection to.  Does this via SOCKS proxying.  Applications must either be SOCKified, or you must use a dunamic SOCKSifier.

Free service is slow.  Paid service is inexpensive, and offers OK speed.
0
 
LVL 4

Expert Comment

by:zookeepa1
ID: 9741489
Sounds dangerous.
0
 
LVL 16

Expert Comment

by:SteveJ
ID: 9742419
Netcat can do the same . . . free. You just need enough net knowledge to be able to use it. If you are asking about how to bypass firewalls, I doubt this is the case.

Good luck,
Steve
0
 
LVL 31

Expert Comment

by:qwaletee
ID: 9742503
SteveJ,
Netcat requires that you set up your own listener.  The nice ting about http-tunnel is that you don;t need to know much to set it up, and it works on demand for anything, because the server is always there.
0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 
LVL 16

Expert Comment

by:SteveJ
ID: 9743042
Good point, qwaletee . . . I was assuming . . .
0
 
LVL 31

Expert Comment

by:qwaletee
ID: 9743293
zookeepa1,
Absolutely.  Isn't the advice here always laced with caveat emptor?
0
 
LVL 16

Expert Comment

by:SteveJ
ID: 9743346
That's odd, qwaletee. I lace my shoes with caveat emptor.

Steve
0
 
LVL 31

Expert Comment

by:qwaletee
ID: 9744185
Well, Steve, you should use neither full balss of twine nor young rose stems to replace your sholaces.  Then, you would not need caveat emptor when lacing your shoes.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Join & Write a Comment

Suggested Solutions

Some time ago I was asked to set up a web portal PC to put at our entrance. When customers arrive, they could see a webpage 'promoting' our company. So I tried to set up a windows 7 PC as a kiosk PC.......... I will spare you all the annoyances I…
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now