MegaSecurity.org
Home Related Translate Site Search

Firewall Related Topics

Firewall overview by Kurt Seifried.
Firewalls FAQ by Matthew Curtin.
How to Bypass Your Corporate Firewall Using SSH Tunneling by ~pingywon, 2004
Bypassing Firewall: Tools and Techniques (PDF). by Jake Hill
How to bypass your personal firewall outbound detection (external link)
ZoneAlarm Pro's MailSafe Insecurity
Trojans can block ZoneAlarm by setting a Mutex in memory
Norton Antivirus 2002 Security Flaws
Network Intrusion Detection Systems: FAQ
FireWall-1 RDP Bypass Vulnerability Exploit Code
Personal Firewalls Under Fire.
VPN-1/FireWall-1 Format String Vulnerability.
CERT� Advisory CA-2001-17 Check Point RDP Bypass Vulnerability
Norton Antivirus Real-time Protection can be Deactivated
Trend Micro VirusWall Allows Reconfiguration without Authentication
Internet Firewalls: Frequently Asked Questions
Firewall-1 DoS Attack by Tim Hall.
Disabling Norton Antivirus 2001 by SennaSpy.
Multiple weaknesses found in ZoneAlarm
CrackPipe. Program to tunnel an IP, used to break through firewalls
Cracking Firewalls
Microsoft Corp will give personal firewall vendors advanced access to code for future Windows 2000 Service Packs to avoid repetition of the bug that this week disabled firewalls for more than 3.5 million users using the Redmond, Washington-based company's latest operating system. Read more.
Norton Patches Firewall Holes
Out of order SMTP DATA command can be used to bypass firewall protection
ACK Tunneling Trojans
Placing Backdoors Through Firewalls by van Hauser.
Zonealarm Firewall can be easily scanned for open ports
BlackICE default configuration does not block Back Orifice
Gauntlet Firewall exploit code
HTTP tunneling
ICMP tunneling
Hackers breach Checkpoint's Firewall-1
Home PC Firewall Guide
The easy passage of all kinds of data through computers' Port 80 is making it harder to build Web virus killers. A Prime Port of Call for Hackers?

 

Examples of TROJANS that can bypass Firewalls
A311 Death
Aphex FTP
Aphex tunneld 2.0
Assasin
Bifrost
Cold Fusion
FKWP
Flux
Gadu Ghost
Hookbyter-test 2.5
HooliGGan Trojan A+
Initiation
Insurrection
Kaos Webdownloader
KBL Uploader
KBL Webdownloader
Levithan
Liciaa Fwb Downloader 1.0
Mafia Downloader
MagicLink
Noob
Nuclear RAT
Nuclear Uploader
Optix Lite Firewall Bypass
Phi FWB Bypass 1.0
Roach
Sandesa
Sinique
TinyFWB 1.0
trojan friend
Waldo Beta

Samples of TROJANS capable of killing Firewalls and/or AntiVirus Programs
23 0.3
711
A311 Death
Abacap
aim Pass
Amitis
AntiPC
Armageddon
Assasin
BAD R.A.T.
Cafeini
Backdoor.Delf.c
Beast
BioNet
BlueAdeptz
Buschtrommel
CAFEiNi
Cold Fusion
Corrupted Lite
Cyberspy
Danton 3.0
DarkMoon
DataRape
DA-WEB 2.1 & later
DSK-Lite
Dieter
Ehks
Erazer 1.0

FeRAT
FI7 1.4b
Freddy K
Ghost
GLSSpy
G-spot
Guangwai Girl
Hack Tool
Hatred-Fiend
Helios
Herman Agent
Hook Downloader
HTTP RAT
Infinity WebDownloader
Iniquity Rat
Insurrection
Insecure Executable Downloader
Insidious WebDL 1.0
Iowa's Webdownloader
JustJoke
KPSULE Downloader
KPSULE KeyLogger
Kronical Fire
Katux Latinus
Kryptonic Ghost
LanFiltrator
Massaker
MiniDL
MoSucker
Multi Bot Pro
NeuroticKat
Nova
Nuschekrischtoff
Optix Pro
PA HAC Wlam 1.0
Paszczus
Poltergeist
Polyserver
ProRat
PS Devil
R0xR4t
Recon
Red
Remote Control 1.0
Senna Spy Trojan Generator
Schneckenkorn 1.0
SkyRat
Smart-Hack Uploader
Sparta
Super Stealth Key Capturer
System33r Stealth Downloader
Theef
Rux
Tindler 1.0
TNT
Tron
Troya
Visitor
Illwill Webdownloader
WormTrojan
X� WebDL
Y3K_Rat
Yahoo Spy Final Version
Yet Another Trojan by toxed
Z-demon
Z-downloader

Firewall Forum

Firewalls Binaries

Exploits

Site Search

Search SecurityFocus


Copyright� MegaSecurity.org