What's New!

Chat with

How to Defend
Your Computer 

The Guides
to (mostly) 
Harmless Hacking

Happy Hacker 
Digests (old stuff) 

Hacker Links 


Meet the 
Happy Hacksters 

Help for 



It Sucks 
to Be Me!

How to Commit
Computer Crime (not)! 

What Is a 
Hacker, Anyhow? 

Have a 
Great Life! 

News from the 
Hacker War Front

Advanced Info on Firewalls for Home Computer Users

How Hackers Defeat Personal Firewalls

From: Mystykalsystym@cs.com
Date: Sun, 17 Dec 2000 07:50:07 EST
Subject: kewl stuff

Ever get annoyed cause you wanted to place a trojan or a virus somwhere and a firewall wouldnt let you? Well if this firewall is one of the commercially made and distributed types such as Norton personal firewall, or Blackice Defender, and most any other comercially available firewalls it is very simple to exploit it and put anything you want behind it. Most personal firewalls work by having a preset rules database that has a listing of trusted applications that it will allow access to and from your computer. A simple modification of a rogue application such as a trojan horse or virus will allow the rogue application to have trusted access to your system. The modification requires no programming knowledge and can be done by anyone very easily. All you have to do is rename the rogue application to a name that the personal firewall knows is a trusted application.
For example if I take BackOrifice, the stealth remote control application, and rename it iexplore.exe, most personal firewalls will allow it to run without complaint. The same is true for any other trojan horse or virus.
Kinda neat huh?
There is only one readily available firewall that I cant use this with and thats zonealarm from zonelabs. http://zonelabs.com/
BTW my handle is natas and I look forward to upcoming issues of your newsletter. I haven't been hacking maliciously for years now, actually since i got caught in highschool and lost my priviliges to use a computer till i was 18. Please visit my homepage if youd like http://www.geocities.com/mystykalsystym/natas.html.

In-depth Information on Personal Firewalls

Carolyn's most
popular book,
in 4th edition now!
For advanced
hacker studies,
read Carolyn's
Google Groups
Subscribe to Happy Hacker
Visit this group

 © 2013 Happy Hacker All rights reserved.