On Wed, 31 Aug 2005, Aditya Deshmukh wrote: > > -----Original Message----- > > From: [EMAIL PROTECTED] > > [mailto:[EMAIL PROTECTED] On Behalf > > Of Bernardo Mart?n > > Sent: Tuesday, August 30, 2005 1:11 PM > > To: Full Disclosure > > Subject: RE: [Full-disclosure] RE: Example firewall script (iptables) > > > > In my first email i requested about bad example firewall > > script, in later > > mail i said that this script was to learn more so the scene > > isn't important > > because i'm loking for bad script in any scene > > If you are going to learn go to the Linux documentation project > Website. > > There is a how-to Linux-firewalls that is a pretty good document > Also there are some other documents breaking out of firewall
The firewall piercing howto is a good read in concept here as well: http://www.ibiblio.org/pub/Linux/docs/HOWTO/other-formats/html_single/Firewall-Piercing.html Its a good lesson in covert channels :) -- Eric Wheeler Vice President National Security Concepts, Inc. PO Box 3567 Tualatin, OR 97062 http://www.nsci.us/ Voice: (503) 293-7656 Fax: (503) 885-0770 _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
