Author Topic: Are all your probes blocked?  (Read 4380 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33916
  • malware fighter
Are all your probes blocked?
« on: December 16, 2005, 07:16:17 PM »
Hello forum folks,

Do you have a firewall, and is it functioning. Are all your probes blocked, meaning you are completely stealthed.

Test here: http://scan.sygate.com/quickscan.html

Hope it is OK,

greets,

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

..::ReVaN::..

  • Guest
Re: Are all your probes blocked?
« Reply #1 on: December 16, 2005, 07:30:27 PM »
All stealth here....

Offline szc

  • Avast Evangelist
  • Starting Graphoman
  • ***
  • Posts: 6927
Re: Are all your probes blocked?
« Reply #2 on: December 16, 2005, 07:54:25 PM »
Same here... I even tried to test everything with Kerio Firewall disabled (my Linksys router/firewall in the background) and I got same results...

       
« Last Edit: December 16, 2005, 07:58:14 PM by S.Z.Craftec »
MB: GIGABYTE GA-Z77X-UD3H Intel 7 Series  - LGA1155, CPU: Intel Core i5-3570K - Quad Core, 3.40GHz (3.80GHz Max Turbo), CPU COOLER: Cooler Master Hyper 212 EVO Direct Heat Pipe R2, RAM: 16 GB Kingston HyperX Blu DDR3, VIDEO CARD: Galaxy GeForce GTX 560 Ti - 1GB, GDDR5, POWER SUPPLY: Corsair Enthusiast Series TX750 V2 - 750 Watts, HD: Seagate Barracuda - 2TB, 7200RPM, 64MB, SATA 6Gb/s

..::ReVaN::..

  • Guest
Re: Are all your probes blocked?
« Reply #3 on: December 16, 2005, 08:04:01 PM »
Yes Sasha a hardware firewall router is a must for any broadband internet user.It sure saves you alot of trouble hehe

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33916
  • malware fighter
And if you have the hardware router?
« Reply #4 on: December 16, 2005, 08:57:52 PM »
Hello ReVaN,

And for instance if you have a Viking router, you can wonderful things for it here, tweak it. And if you have another type download the source code from here:
http://corz.org/comms/hardware/router/viking.voyager.advanced.php?page=all

Enjoy,

polonus
« Last Edit: December 16, 2005, 09:06:54 PM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

..::ReVaN::..

  • Guest
Re: Are all your probes blocked?
« Reply #5 on: December 16, 2005, 09:34:34 PM »
A really nice site Polonus..I found the P2P probe very usefull.But i don't have a Viking i am on Linksys just like Sasha(but i have a custom firmware).Are these Viking routers any good?

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33916
  • malware fighter
Re: Are all your probes blocked?
« Reply #6 on: December 16, 2005, 10:02:01 PM »
Hello ReVaN,

I suppose so, but you could download the code of the Viking probe and alter the code to suit your linksys. If the Viking is on 192.168.1.1. your linksys operates I think on 10.0.0.138,
so: this would be your configuration
-------
#!/bin/sh
#
#
# enable zipb mode on linksys router/modem..

# edit to suit your needs
#
# ;o)
# (or

#router="router"
router="10.0.0.138"
user="admin"
password="admin"

{
   sleep 1;
   echo $user
   sleep 1;
   echo $password
   sleep 1;
   echo "delete dhcp server pool poolid 0"
   sleep 1;
   echo "create dhcp server pool poolid 0 start-ip 10.0.0.138  end-ip 10.0.0.138 mask 255.255.255.0 gwy 10.0.0.138  enable"
     sleep 1;
   echo "modify dhcp server cfg enable"
     sleep 1;
   echo "modify nat global disable"
     sleep 1;
   echo "modify zipb cfg enable"
     sleep 1;
   echo "modify ppp intf ifname ppp-0 startondata"
     sleep 2;
   echo "commit"
   sleep 3;
   echo "reboot"
   sleep 1;

} | telnet $router

# fin
# BIG Router Automatic Deletions
#
# for freshly flashed voyager routers, deletes all the in-built rules
# automatically. you need a *nix shell to run this version
#
# for more info see "rad"
#
# (c) corz.org
#
# more details here..
# http://corz.org/comms/hardware/router/
#

# prefs..

#router="router"
router="10.0.0.138"
user="admin"
password="admin"

# the action..
{
   sleep 1;
   echo $user
   sleep 1;
   echo $password
   sleep 1;
   echo "delete ipf rule entry ruleid 10"
     sleep 1;
   echo "delete ipf rule entry ruleid 11"
     sleep 1;
   echo "delete ipf rule entry ruleid 12"
     sleep 1;
   echo "delete ipf rule entry ruleid 30"
     sleep 1;
   echo "delete ipf rule entry ruleid 31"
     sleep 1;
   echo "delete ipf rule entry ruleid 32"
     sleep 1;
   echo "delete ipf rule entry ruleid 50"
     sleep 1;
   echo "delete ipf rule entry ruleid 51"
     sleep 1;
   echo "delete ipf rule entry ruleid 52"
     sleep 1;
   echo "delete ipf rule entry ruleid 70"
     sleep 1;
   echo "delete ipf rule entry ruleid 71"
     sleep 1;
   echo "delete ipf rule entry ruleid 72"
     sleep 1;
   echo "delete ipf rule entry ruleid 74"
     sleep 1;
   echo "delete ipf rule entry ruleid 90"
     sleep 1;
   echo "delete ipf rule entry ruleid 91"
     sleep 1;
   echo "delete ipf rule entry ruleid 92"
     sleep 1;
   echo "delete ipf rule entry ruleid 94"
     sleep 1;
     
   echo "delete ipf rule entry ruleid 1010"
     sleep 1;
   echo "delete ipf rule entry ruleid 1020"
     sleep 1;
   echo "delete ipf rule entry ruleid 1030"
     sleep 1;
   echo "delete ipf rule entry ruleid 1040"
     sleep 1;
   echo "delete ipf rule entry ruleid 1090"
     sleep 1;
   echo "delete ipf rule entry ruleid 1190"
     sleep 1;
   echo "delete ipf rule entry ruleid 1200"
     sleep 1;
   echo "delete ipf rule entry ruleid 1230"
     sleep 1;
   echo "delete ipf rule entry ruleid 1240"
     sleep 1;
   echo "delete ipf rule entry ruleid 1250"
     sleep 1;
   echo "delete ipf rule entry ruleid 1260"
     sleep 1;
   echo "delete ipf rule entry ruleid 1270"
     sleep 1;
   echo "delete ipf rule entry ruleid 1280"
     sleep 1;
   echo "delete ipf rule entry ruleid 1290"
     sleep 1;
   echo "delete ipf rule entry ruleid 1300"
     sleep 1;
   echo "delete ipf rule entry ruleid 1310"
     sleep 1;
   echo "delete ipf rule entry ruleid 1320"
     sleep 1;
   echo "delete ipf rule entry ruleid 1330"
     sleep 1;
   echo "delete ipf rule entry ruleid 1340"
     sleep 1;
   echo "delete ipf rule entry ruleid 1350"
     sleep 1;

   echo "exit"
} | telnet $router

# fin
------

Just to give you an example, limitations are only set by your
phantasy for the idrules,  Young Skywalker.

greets,

polonus
« Last Edit: December 16, 2005, 10:06:03 PM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

neal62

  • Guest
Re: Are all your probes blocked?
« Reply #7 on: December 16, 2005, 11:22:37 PM »
Hi Polonus,

Yes all my probes are blocked using the free Comodo Firewall Version 1.1.002. I am not including a screen shot but I had 18 systems ports scanned, results blocked or stealthed. Then another 8 ports that are commonly used by Trojans were scanned, results blocked or stealthed. Once again another scan of my ICMP, type 8 was scanned with results blocked, or stealthed.
   So, my friend, along with a thorough and complete "Stealthed" test result from Steve Gibsons GRC test with using "Comodo Free F.W." I am more than satisfied with the performance of Comodo as a new, viable and good operating firewall. The following quote from the Sygate test site stated this:
" You have blocked all of our probes! We still recommend running this test both with
and without Sygate Personal Firewall enabled... so turn it off and try the test again."
Thanks for the site Polonus, have a nice day.  ;D
neal

justin1278

  • Guest
Re: Are all your probes blocked?
« Reply #8 on: December 16, 2005, 11:44:28 PM »
I was stealthed with and without my comodo personal firewall. My linksys firewall works!