Tips and Tricks to get a good firewall program
Kamis, 04 Desember 2008
This is the program for a number Firewall Test. There are 17 engineering program, and I must pass, it all Pass. Means that the firewall program that built " good "! I just step 1 can detect a firewall, the firewall is used to replace or reset the config before the next test to continues. So should you run sequentially under this program. Because some of the programs under the program using Trojan why. I perforated, I think the responsibility lhooo. The Iraqi-me remove it except the windows or install Reimport I find rather hard. So should follow the rules :
- Make sure the pitch Antivirus installed
- Firewall or anti-Trojan programs installed
- Make sure the switch on Windows Firewall in the Control Panel
Start:
1. Leak Test
Download the program here
Run the program and click the button TEST FOR LEAKS, tough results. I Connect program is succesfull, it means your firewall is bad. Dispose of it, because I have known allow the program to access the Internet But the firewall you reject this program, then continue with number 2 below
2. TooLeaky
Download the program here
This program will be running Internet Explorer and go back to the server GRC send your personal data. I pass, and the open Internet, that means your firewall SUCKS! Change we're .. I pass a firewall and block out the message GRC is Down, you can proceed to number 3
3. Firehole
Download the program here
This is the Trojan's why, but the lightweight class. Let's safe, tut. Then, after running the program click on START. The program will send a message to the server Trojan. Kaloo you post the latest Windows Update and via the Windows update, then the error will appear guise of a warning from Windows. I do not, you depend on the same firewall and your antivirus software
4. Yalta
Download here
Extract the folder in the first cleanup. Then run Yalta. Press key CLASSICAL LEAK TEST or advance. I firewall detects your internet access this program, can proceed to the next
5. Outbond
Download here
Run, I terlewati Internet access, firewall means you leak.
6. PCAudit
Download here
Caution, this is my Trojan Generator why. I detected Antivirus / AntSpyware. Let's, for test purposes. Enjoy safe. I trouble you for downloading the program, turn off the antivirus software first. Later when running this program, can be activated again for the test firewall and AV
7. Atelier
This is the Firewall Tester's komperehensif, first install the program and will be acquired 6 leakage testing techniques your firewall. You must pass all. I pitch it your Windows security update it. The program will be denied inii run
8. Thermite
Download program here
This program uses DLL injection techniques. I firewall or antivirus software you cry means you safe.
9. CopyCat
Download here
Process Injection via cmd.
10. MBTest
Download here
Do not forget to extract the files in the system32 directory (packet.dll) and system32/driver/npf.sys
http://www.filelodge.com/files/room2.../10-mbtest.zip
This program will check and send all the packets of data to the Internet.
11. Wallbreaker
Download the program here
There are 4 test I have to skip you. Utilizing the Internet Explorer for implementing the Connection. So I multistage process may be difficult for firewalls to detect. For the Explorer and Internet Explorer are usually allowed for access. I Inet open, meaning you do not have firewalls support multiple process Process Threat to-4 unique, so the program will be launched via the schedule. And will be run when you dally in the schedule page
12. PCAudit2
Download and install the program here
Run, the program will run the process Explorer. Then do DLL injection. Very rarely firewall to detect this. The program will continue to try internet connection. Then the program will apply, such as keylogger.
13. Ghost
Download program here
This program requires the data.lalu interaction data to send my andaketik (keylogger) secretly background. Hopefully you can detect the firewall's this.
14. DNS Tester
Can be downloaded here
The program will conduct DNS cache flush, and then send some of my DNS requests left by the firewall. I run this program successfully, that means your firewall to detect the late DNS Request, or it failed. Enable-a Windows DNS Client Service when the program galgal execution.
15. Surfer
Download the program here
The program will control the Internet through the DDE Interface explorer. Your firewall should reject this connection.
16. BreakoutWP
Download the program here
This program sends the url to Explore the Internet via the Windows API SendMessage. I Inet you open, meaning that the Windows Firewall or your Vulnerable against this Trojan
17. Jumpers
Download here
Tester's Explorer will kill you and make injection DLL files, and then connect via Internet Explorer. So it should not surprise you to disappear tiba2 Explorer, but will appear again thin. This will show whether your firewall to quickly detect changes, etc., or registry.
source : forum.amikom.ac.id by Dony Ariyus
0 komentar:
Posting Komentar