On Wed, 31 Aug 2005, Aditya Deshmukh wrote:
> > -----Original Message-----
> > From: [EMAIL PROTECTED]
> > [mailto:[EMAIL PROTECTED] On Behalf
> > Of Bernardo Mart?n
> > Sent: Tuesday, August 30, 2005 1:11 PM
> > To: Full Disclosure
> > Subject: RE: [Full-disclosure] RE: Example firewall script (iptables)
> >
> > In my first email i requested about bad example firewall
> > script, in later
> > mail i said that this script was to learn more so the scene
> > isn't important
> > because i'm loking for bad script in any scene
> 
> If you are going to learn go to the Linux documentation project
> Website.
> 
> There is a how-to Linux-firewalls that is a pretty good document
> Also there are some other documents breaking out of firewall

The firewall piercing howto is a good read in concept here as well: 
http://www.ibiblio.org/pub/Linux/docs/HOWTO/other-formats/html_single/Firewall-Piercing.html

Its a good lesson in covert channels :)



-- 
Eric Wheeler
Vice President
National Security Concepts, Inc.
PO Box 3567
Tualatin, OR 97062

http://www.nsci.us/
Voice: (503) 293-7656
Fax:   (503) 885-0770

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to