Unusual firewall bypassing techniques, network and computer security.

It was all very well to say `Drink me,' but the wise little Alice was not going to do that in a hurry. `No, I'll look first,' she said, `and see whether it's marked "poison" or not'; for she had read several nice little histories about children who had got burnt, and eaten up by wild beasts and other unpleasant things, all because they would not remember the simple rules their friends had taught them: such as, that a red-hot poker will burn you if you hold it too long; and that if you cut your finger very deeply with a knife, it usually bleeds; and she had never forgotten that, if you drink much from a bottle marked `poison,' it is almost certain to disagree with you, sooner or later.

Lewis Carroll "Alice In Wonderland"
Chinese French Russian Spanish Polish Italian
Home | Projects | Papers | Forum | Team | Links | Contributions

Firepass - is a tunneling tool, allowing to bypass firewall restrictions and encapsulate data flows inside legal ones to use HTTP POST requests. TCP or UDP based protocols may be tunneled with Firepass. For now, both - client and server parts are written in Perl and the server script acts as a CGI program.

The Firepass key feature is that you may use several type of installation of the server part script in the external network. You do not need to bind any port on the external box. Firepass may also be usable for the reverse task, when the server script is located at the corporative web server and when client interact with it from the external network.

Alex Dyatlov
Current Firepass version: 1.1.2a; README , CHANGELOG
Download | md5sum: 6e533e57ea5b4fc02dc0f6e851840bbd

Index of projects

Paper : Reverse Tunneling Techniques: theoretical requirements for the GW implementation.

Team member's sites:

GNU  GNU General Public License
 GNU Free Documentation License