Contact Us
Article
Hacker Tools New Update | Download Directory |
| Windows | Linux | Mac OS X | Mobile | Assessment | Defense | Documents | Miscellaneous |
Hacker Tools » Download -> Windows-> Firewalls » Fpipe Version 2.1

This Directory TOP
Fpipe Version 2.1
Privatefirewall 7.0.27.1
XP Firewall Commander 4.1.1
Outpost Firewall Pro 7.5.1.3791.596.1681.481
Mindsoft Firewall 4.05
Wallix Pro 4.0.3
VisNetic Firewall 3.03
Online Armor Free 5.1.1.1395
IP Relay Server 3.6
PortsLock 2.0
ZoneAlarm 9.1.007
Jetico Personal Firewall 2.1.0.10.2456
Torpark 2.9.1.2
ZoneAlarm Pro 10.0.250.000
RusRoute 1.8.2
NeT Firewall 3.0.23
ZoneAlarm Firewall (Windows 2000/XP) 7.0.483
McAfee VirusScan with Firewall 2008
Kaspersky Internet Security 6.0
AVG Anti-Virus plus Firewall 9.0.839
ZoneAlarm Firewall
Kerio WinRoute Firewall 6.7.1 Patch 2 Build 6544
Kerio WinRoute Firewall 6.5.0 Build 4794
PC Tools Firewall Plus 6.0.0.88
USB FireWall 1.1.3
Firewall Builder 5.1.0
USB FireWall 1.1.2
BeeThink IP Blocker 1.2
DefenseWall Personal Firewall 3.16
Kerio Personal Firewall 4.2.0
ZoneAlarm Internet Security Suite 2010 9.3.037
Outpost Security Suite Pro 2009 6.7.3.3063.452.0726
Search

Fpipe Version 2.1

File Size: 9KB
Developer: http://www.foundstone.com
Description:     FPipe is a source port forwarder/redirector. It can create a TCP or UDP stream with a source port of your choice. This is useful for getting past firewalls that allow traffic with source ports of say 23, to connect with internal servers.

Usually a client has a random, high numbered source port, which the firewallpicks off in its filter. However, the firewall might let Telnet traffic through. FPipe can force the stream to always use a specific source port, in this case the Telnet source port. By doing this, the firewall sees the stream as an allowed service and lets the stream through.

FPipe basically works by indirection. Start FPipe with a listening server port, a remote destination port (the port you are trying to reach inside the firewall) and the (optional) local source port number you want. When FPipe starts it will wait for a client to connect on its listening port. When a listening connection is made a new connection to the destination machine and port with the specified local source port will be made - creating the needed stream. When the full connection has been established, FPipe forwards all the data received on its inbound connection to the remote destination port beyond the firewall.

FPipe can run on the local host of the application that you are trying to use to get inside the firewall, or it can listen on a 3rd server somewhere else.

Say you want to telnet to an internal HTTP server that you just compromised with MDAC. A netcat shell is waiting on that HTTP server, but you cant telnet because the firewall blocks it off. Start FPipe with the destination of the netcat listener, a listening port and a source port that the firewall will let through. Telnet to FPipe and you will be forwarded to the NetCat shell. Telnet and FPipe can exist on the same server, or on different servers.
Download:   Fpipe Version 2.1

 

Sponsor Links

Sponsor Links

Share/Bookmark