Category: Firewall

Penetration techniques – Part 2

Continuing the series from Agnitum firewall guide: 3 . Application window control Windows allows applications to exchange window messages between processes. Malicious processes can get control over other network-enabled applications sending them window messages and imitating user input from keyboard and mouse clicks. The example of using this technique is Breakout leaktest (http://www.firewallleaktester.com/leaktest16.htm). Here the

Continue Reading →

Penetration techniques – Part 1

Below are some penetration techniques I recently came across in the agnitum firewall guide.  I thought I would share it with all who are doing some sort of tests of their firewall or just FYI. 1. Components injection Windows operating system by design enables installing system interceptors (hooks) through which foreign code can be injected

Continue Reading →