This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | Next revision Both sides next revision | ||
network_security_assesment [2009/06/08 03:06] k2patel |
network_security_assesment [2009/06/08 03:36] k2patel |
||
---|---|---|---|
Line 436: | Line 436: | ||
usage: lsrtunnel -i <proxy IP> -t <target IP> -f <spoofed IP> | usage: lsrtunnel -i <proxy IP> -t <target IP> -f <spoofed IP> | ||
</code> | </code> | ||
+ | |||
+ | == Using Specific Source Ports to Bypass Filtering == | ||
+ | information regarding circumvention of Firewall-1 in certain\\ | ||
+ | configurations, consult the excellent presentation from Black Hat Briefings 2000 by\\ | ||
+ | Thomas Lopatic et al. titled “A Stateful Inspection of Firewall-1” available as a Real\\ | ||
+ | Media video stream and PowerPoint presentation from [[ http://www.blackhat.com/html/bh-usa-00/bh-usa-00-speakers.html | Link]] | ||
[[91]] | [[91]] |