Page 1 of 3 123 LastLast
Results 1 to 10 of 24

Thread: how can hide to a firewall?

  1. #1
    Junior Member
    Join Date
    Dec 2002

    Lightbulb how can hide to a firewall?

    i like to install kazaa but could not connect to different computers because a firewall refuse to connect... how could i hide to a firewall?
    a wise man learns from a fool man but a fool man never learns from a wise man...

  2. #2
    Senior Member
    Join Date
    Feb 2003
    I don't know if I understood your question?

  3. #3
    Senior Member
    Join Date
    May 2003
    seems to be ur problem will be solved by using HTTP tunnel...google for it and download

    guru@linux:~> who I grep -i blonde I talk; cd ~; wine; talk; touch; unzip; touch; strip; gasp; finger; mount; fsck; more; yes; gasp; umount; make clean; sleep;

  4. #4
    Join Date
    Feb 2002
    The only way to get past the firewall is to learn first what type of firewall is running and then attempt, goodluck, to bypass it's rules.


    HTTP Tunnel will work as long as there are no other IDS apps running and the SA is an idiot but hell, give it a try.


  5. #5

    got the same sore

    hi ascii, I also had the same problem i wanted to chat with yahoo messenger and irc but my pc is connected to a lan . I tried downloading http tunnel (cracks up the firewall and lets you bypass) and it worked! Go to www.http-tunnel.com
    i\'m desperate to crack this network security and start chatting here at the office!

  6. #6
    Senior Member
    Join Date
    Mar 2003
    I believe there are settings in the Options/preferences area in kazaa that can you can set to go through your firewall if you are having problems. Im kinda confused by the question too but this is from what i understood. Hope it helped even a little.

    #!/usr/local/bin/perl -s-- -export-a-crypto-system-sig -RSA-in-3-lines-PERL
    ($k,$n)=@ARGV;$m=unpack(H.$w,$m.\"\\0\"x$w),$_=`echo \"16do$w 2+4Oi0$d*-^1[d2%
    Sa2/d0<X+d*La1=z\\U$n%0]SX$k\"[$m*]\\EszlXx++p|dc`,s/^.|\\W//g,print pack(\'H*\'
    ,$_)while read(STDIN,$m,($w=2*$d-1+length($n||die\"$0 [-d] k n\\n\")&~1)/2)

  7. #7
    Junior Member
    Join Date
    Sep 2003
    Hiya, ascii.

    The answer changes very little based on the firewall you are using. If you are using a tool like ZoneAlarm you will simply have to tell it that outbound connections from 'kazaa.exe" are authorized. Other software firewalls on your system will have a similar function.

    If this is a firewall outside your controll you will have to do like the others said and tunnel around it. In kazaa you can change the ports it connects through. Go to Tools in the menu, select Options > select the Traffic tab. At the bottom you will see something about using port XXXX for incoming connections (this is only if you are sharing from this system). It also allows you to define port 80 for incoming connections. The settings for a proxy are for your outbound connections (for you to download from). You can find proxy servers (Google) that you can point kazaa to and shoudl be able to tunnel out that way.

    good luck
    Where\'s the ka-booom?
    There was supposed to be an earth-shattering ka-booom!

  8. #8
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    United Kingdom: Bridlington

    Sorry to sound boring but:


    And shame on any AOer who encorages you to!

    If you hack out through a firewall you are compromising the network..............why do you think they paid for the firewall in the first place? Why do they employ Sysadmins?

    You will almost certainly get CAUGHT and thrown out of school/fired Do you think that the firewall is the only tool your Sysadmins have.

    You may think you are well cool right now, but you won't when you get roasted for what you are doing.

    Please consider my advice carefully..................your futures may depend on it?

    Good Luck

  9. #9
    Senior Member RoadClosed's Avatar
    Join Date
    Jun 2003
    I agree with you Nihil, except for people living in coutries were the government supresses access to the internet as a form of opression.
    West of House
    You are standing in an open field west of a white house, with a boarded front door.
    There is a small mailbox here.

  10. #10
    Senior Member
    Join Date
    Jun 2003
    Intersting so far but confusing....

    how do you know he's running from school or someplace with a sysadmin.

    I have a firewall/router and I use some p2p programs that require to configure certain port forwarding in my router. I have not opened up and security breach unless the program itself is exploitable, its the same as running a webserver with forwarding on port 80.

    How does an IDS affect httptunnel? This doesnt make since unless your talking about an IPS that has a rule to block kazaa traffic
    That which does not kill me makes me stronger -- Friedrich Nietzche

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts