Halaman

Pulpit rock

Kamis, 01 Desember 2011

How To Bypass The Firewall and The Solution

Before i deep explain about How To Bypass The Firewall and The Solution you must have know about what is the firewall.

Firewall



Firewall is the system which filtering the access that allow every safe connection and disallow the other. firewall usually place between gateway from localhost to network. and used for controlling access and prevent the system from harm activities that make your system danger such as cracker, spy, stealing the data and much more. firewall is the last defend on your system, that's why many of commercial company spend their money to buy the best firewall just to keep their system secure.

but, here i say that can no one can make a perfect system that can bring you into the peaceful, because everyone in this world always trying to get a vulnerable on it. hehe... ^_^

Network Layer Firewalls 

Network layer firewalls, also called packet filters, operate at a relatively low level of the TCP/IP protocol stack, not allowing packets to pass through the firewall unless they match the established rule set. The firewall administrator may define the rules; or default rules may apply. The term "packet filter" originated in the context of BSD operating systems.
Network layer firewalls generally fall into two sub-categories, stateful and stateless. Stateful firewalls maintain context about active sessions, and use that "state information" to speed packet processing. Any existing network connection can be described by several properties, including source and destination IP address, UDP or TCP ports, and the current stage of the connection's lifetime (including session initiation, handshaking, data transfer, or completion connection). If a packet does not match an existing connection, it will be evaluated according to the ruleset for new connections. If a packet matches an existing connection based on comparison with the firewall's state table, it will be allowed to pass without further processing.
Stateless firewalls require less memory, and can be faster for simple filters that require less time to filter than to look up a session. They may also be necessary for filtering stateless network protocols that have no concept of a session. However, they cannot make more complex decisions based on what stage communications between hosts have reached.
Modern firewalls can filter traffic based on many packet attributes like source IP address, source port, destination IP address or port, destination service like WWW or FTP. They can filter based on protocols, TTL values, netblock of originator, of the source, and many other attributes.
Commonly used packet filters on various versions of Unix are ipf (various), ipfw (FreeBSD/Mac OS X), pf (OpenBSD, and all other BSDs), iptables/ipchains (Linux).

Proxy


proxy device (running either on dedicated hardware or as software on a general-purpose machine) may act as a firewall by responding to input packets (connection requests, for example) in the manner of an application, while blocking other packets.
Proxies make tampering with an internal system from the external network more difficult and misuse of one internal system would not necessarily cause a security breach exploitable from outside the firewall (as long as the application proxy remains intact and properly configured). Conversely, intruders may hijack a publicly-reachable system and use it as a proxy for their own purposes; the proxy then masquerades as that system to other internal machines. While use of internal address spaces enhances security, crackers may still employ methods such as IP spoofing to attempt to pass packets to a target network.

so what you think about firewall??

this is i usualy just do the reckless think that maybe you never imagine. as we know before the most of firewall prevent the system access disallowing the access from outside but do you know that firewall just do the job by remembering the local IP. and that the most vulnerable, because if you change your IP address then all the "hard-job" by the firewall is nothing.

that's why we can surf whatever we want because the firewall not recognizing anymore. so much tools that you can use to change your IPaddress.

just see the proof of concept that i do here

First step, I want to know my ip before i change it 


that should be show like this 



that is my original IP address, and the number that firewall recognize too. as i say before, to bypass the firewall you must make it "confuse" just doing like this 

for the example i using this website to change my ip address 


i just want to check again my ip address now.


now you must be recognize the difference of that, aren't you?
why that can be like that? it's easy to explain. the proxy server will move your site into the proxy database before showing to you that why the your ip will change be the server proxy address by the ip reader. 

that the little explain from me .. 

bypass any firewall part 1


bypass any firewall part II


Enjoy Safe Surf


Regards 

Apeh1706

Tidak ada komentar:

Posting Komentar