I have recently found a tool that you can install on your workstation and manually setup various protocols to be tunnelled through different ports. Confused??

Ill see if I can elaborate. Hypothetically speaking, if your ISP is blocking incoming Netbios, you can set your workstation to accept this Netbios traffic via any port that you specify, like Port 9000. Circumventing rules setup by your ISP.

Does anyone have more information on how this may be a useful tool for malicious use? Keeping in mind that you can only tunnel INCOMING traffic to your workstation.

Another question, is anyone aware of this process, but in reverse. For example, tunnelling OUTBOUND Telnet traffic via http? Im just interested, as if there is, what use would firewalls/access lists be?

Your thought/comments would be appreciated.