[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.50.0508302012560.25966-100000@kegger.national-security.net>
Date: Wed Aug 31 04:37:54 2005
From: fd at ew.nsci.us (fd@...nsci.us)
Subject: RE: Example firewall script (iptables)
On Wed, 31 Aug 2005, Aditya Deshmukh wrote:
> > -----Original Message-----
> > From: full-disclosure-bounces@...ts.grok.org.uk
> > [mailto:full-disclosure-bounces@...ts.grok.org.uk] On Behalf
> > Of Bernardo Mart=EDn
> > Sent: Tuesday, August 30, 2005 1:11 PM
> > To: Full Disclosure
> > Subject: RE: [Full-disclosure] RE: Example firewall script (iptables)
> >
> > In my first email i requested about bad example firewall
> > script, in later
> > mail i said that this script was to learn more so the scene
> > isn't important
> > because i'm loking for bad script in any scene
>=20
> If you are going to learn go to the Linux documentation project
> Website.
>=20
> There is a how-to Linux-firewalls that is a pretty good document
> Also there are some other documents breaking out of firewall
The firewall piercing howto is a good read in concept here as well:=20
http://www.ibiblio.org/pub/Linux/docs/HOWTO/other-formats/html_single/Firew=
all-Piercing.html
Its a good lesson in covert channels :)
--=20
Eric Wheeler
Vice President
National Security Concepts, Inc.
PO Box 3567
Tualatin, OR 97062
http://www.nsci.us/
Voice: (503) 293-7656
Fax: (503) 885-0770
Powered by blists - more mailing lists