[25329] in bugtraq

home help back first fref pref prev next nref lref last post

AW: ITCP Advisory 13: Bypassing of ATGuard Firewall possible

daemon@ATHENA.MIT.EDU (Jonas Koch)
Tue Apr 30 19:38:09 2002

From: "Jonas Koch" <jonas.koch@gmx.ch>
To: "BlueScreen" <BlueScreen@IT-Checkpoint.net>
Cc: <bugtraq@securityfocus.com>
Date: Tue, 30 Apr 2002 12:09:00 +0200
Message-ID: <DBEBKHIMDNKIEMLOAFIDCEADCBAA.jonas.koch@gmx.ch>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
In-Reply-To: <014401c1ef8d$1bb66510$0100a8c0@BlueScreenPrimary>

Most products use checksums to detect replaced or modified applications.

But there are other problems with outbound filters. Most personal firewalls
do not detect if a malicious program uses a 'trusted' application to
transmit data (look at tooleaky.zensoft.com). I have tested several products
with a method similar to Bob Sundling's and only BlackICE PC Protection 3.5
stopped communication (Norton PF, Tiny PF and ZoneAlarm did not stop it).

There is no ultimate way to control all outbound communication. If you use
your own low-level drivers, no personal firewall can stop you.

Jonas


home help back first fref pref prev next nref lref last post