R
Richard Anderson
Subject: Re: Making an app return false information [was: feeding false
anapp]
From: Richard Anderson <[email protected]>
Newsgroups: alt.hacker
Well i checkes it out. It does not have a hostname, neither it gives you
the opportunity to change to which ip address tou ish to connect. He
programmed it in a way that an esoteric mechanism knows exaclty his
servers ip address to connect to. :|
That makes things even more difficult to overcome, but even more
challengable too!
There must be some way though. Because the firewall is an intermediate
between apps and net all data flow pass through it and many times
especially Firewalls with Statefull Packet Inspection can check
incoming/outcoming data flow to mark it as dangerous if it matches
againast its trojan/worm/vulnerabality database against the firewalls
database for possible data flow danger. This feature is extremely
helpfull if a windows service that listens for communication in some port
is vulnerable, and not SP1 or SP2 installed by the user side, so the only
way the user is to be safe is by having a firewall thet blocks those in
danger services (if the user knows them of course) or even better have
the SPI personal firewall block it for him.
I gave this example to state that if the firewall can do such a thing
then of course can manage the bypassing data flow for an outgoing
connection!
Do you also agree with me?
But if yes then how we can take advanatge of that ?!?
**************************************************
The above was o thread i had in alt.hacker
My question is can a firewall intercept tha data flow between 2
applications, one running on localhost and one in an inetserver, so then
we can have the on a firewall log file and finally have the chance to
alter them?
Thank you!
anapp]
From: Richard Anderson <[email protected]>
Newsgroups: alt.hacker
| You mean that his chess server has necceserilly have a hostname except
| the standard ip address ?
Nope, that's the problem. If he doesn't I think you can't use the
"hosts"-file method
Well i checkes it out. It does not have a hostname, neither it gives you
the opportunity to change to which ip address tou ish to connect. He
programmed it in a way that an esoteric mechanism knows exaclty his
servers ip address to connect to. :|
That makes things even more difficult to overcome, but even more
challengable too!
| All data flow passes through the firewall before travels to the internet
| and then the chess server, so in this way why cant we use the personal
| firewall to capture all the traveling data before allow them to fly over
| the internet?
Because the firewall is not meant to be used for this job and that's
the reason why no such feature is included.
There must be some way though. Because the firewall is an intermediate
between apps and net all data flow pass through it and many times
especially Firewalls with Statefull Packet Inspection can check
incoming/outcoming data flow to mark it as dangerous if it matches
againast its trojan/worm/vulnerabality database against the firewalls
database for possible data flow danger. This feature is extremely
helpfull if a windows service that listens for communication in some port
is vulnerable, and not SP1 or SP2 installed by the user side, so the only
way the user is to be safe is by having a firewall thet blocks those in
danger services (if the user knows them of course) or even better have
the SPI personal firewall block it for him.
I gave this example to state that if the firewall can do such a thing
then of course can manage the bypassing data flow for an outgoing
connection!
Do you also agree with me?
But if yes then how we can take advanatge of that ?!?
**************************************************
The above was o thread i had in alt.hacker
My question is can a firewall intercept tha data flow between 2
applications, one running on localhost and one in an inetserver, so then
we can have the on a firewall log file and finally have the chance to
alter them?
Thank you!