User Tools

Site Tools


network_security_assesment

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision Both sides next revision
network_security_assesment [2009/06/08 03:06]
k2patel
network_security_assesment [2009/06/08 03:36]
k2patel
Line 436: Line 436:
 usage: lsrtunnel -i <proxy IP> -t <target IP> -f <spoofed IP> usage: lsrtunnel -i <proxy IP> -t <target IP> -f <spoofed IP>
 </​code>​ </​code>​
 +
 +== Using Specific Source Ports to Bypass Filtering ==
 +information regarding circumvention of Firewall-1 in certain\\
 +configurations,​ consult the excellent presentation from Black Hat Briefings 2000 by\\
 +Thomas Lopatic et al. titled “A Stateful Inspection of Firewall-1” available as a Real\\
 +Media video stream and PowerPoint presentation from [[ http://​www.blackhat.com/​html/​bh-usa-00/​bh-usa-00-speakers.html | Link]]
  
 [[91]] [[91]]
network_security_assesment.txt · Last modified: 2020/08/10 02:35 (external edit)