Are all your probes blocked?

Hello forum folks,

Do you have a firewall, and is it functioning. Are all your probes blocked, meaning you are completely stealthed.

Test here: http://scan.sygate.com/quickscan.html

Hope it is OK,

greets,

polonus

All stealth here…

Same here… I even tried to test everything with Kerio Firewall disabled (my Linksys router/firewall in the background) and I got same results…


http://img397.imageshack.us/img397/9433/untitled12lc.th.jpg

http://img198.imageshack.us/img198/4674/untitled28yh.th.jpg

Yes Sasha a hardware firewall router is a must for any broadband internet user.It sure saves you alot of trouble hehe

Hello ReVaN,

And for instance if you have a Viking router, you can wonderful things for it here, tweak it. And if you have another type download the source code from here:
http://corz.org/comms/hardware/router/viking.voyager.advanced.php?page=all

Enjoy,

polonus

A really nice site Polonus…I found the P2P probe very usefull.But i don’t have a Viking i am on Linksys just like Sasha(but i have a custom firmware).Are these Viking routers any good?

Hello ReVaN,

I suppose so, but you could download the code of the Viking probe and alter the code to suit your linksys. If the Viking is on 192.168.1.1. your linksys operates I think on 10.0.0.138,
so: this would be your configuration

#!/bin/sh

enable zipb mode on linksys router/modem…

edit to suit your needs

;o)

(or

#router=“router”
router=“10.0.0.138”
user=“admin”
password=“admin”

{
sleep 1;
echo $user
sleep 1;
echo $password
sleep 1;
echo “delete dhcp server pool poolid 0”
sleep 1;
echo “create dhcp server pool poolid 0 start-ip 10.0.0.138 end-ip 10.0.0.138 mask 255.255.255.0 gwy 10.0.0.138 enable”
sleep 1;
echo “modify dhcp server cfg enable”
sleep 1;
echo “modify nat global disable”
sleep 1;
echo “modify zipb cfg enable”
sleep 1;
echo “modify ppp intf ifname ppp-0 startondata”
sleep 2;
echo “commit”
sleep 3;
echo “reboot”
sleep 1;

} | telnet $router

fin

BIG Router Automatic Deletions

for freshly flashed voyager routers, deletes all the in-built rules

automatically. you need a *nix shell to run this version

for more info see “rad”

(c) corz.org

more details here…

http://corz.org/comms/hardware/router/

prefs…

#router=“router”
router=“10.0.0.138”
user=“admin”
password=“admin”

the action…

{
sleep 1;
echo $user
sleep 1;
echo $password
sleep 1;
echo “delete ipf rule entry ruleid 10”
sleep 1;
echo “delete ipf rule entry ruleid 11”
sleep 1;
echo “delete ipf rule entry ruleid 12”
sleep 1;
echo “delete ipf rule entry ruleid 30”
sleep 1;
echo “delete ipf rule entry ruleid 31”
sleep 1;
echo “delete ipf rule entry ruleid 32”
sleep 1;
echo “delete ipf rule entry ruleid 50”
sleep 1;
echo “delete ipf rule entry ruleid 51”
sleep 1;
echo “delete ipf rule entry ruleid 52”
sleep 1;
echo “delete ipf rule entry ruleid 70”
sleep 1;
echo “delete ipf rule entry ruleid 71”
sleep 1;
echo “delete ipf rule entry ruleid 72”
sleep 1;
echo “delete ipf rule entry ruleid 74”
sleep 1;
echo “delete ipf rule entry ruleid 90”
sleep 1;
echo “delete ipf rule entry ruleid 91”
sleep 1;
echo “delete ipf rule entry ruleid 92”
sleep 1;
echo “delete ipf rule entry ruleid 94”
sleep 1;

echo "delete ipf rule entry ruleid 1010"
sleep 1;
echo "delete ipf rule entry ruleid 1020"
sleep 1;
echo "delete ipf rule entry ruleid 1030"
sleep 1;
echo "delete ipf rule entry ruleid 1040"
sleep 1;
echo "delete ipf rule entry ruleid 1090"
sleep 1;
echo "delete ipf rule entry ruleid 1190"
sleep 1;
echo "delete ipf rule entry ruleid 1200"
sleep 1;
echo "delete ipf rule entry ruleid 1230"
sleep 1;
echo "delete ipf rule entry ruleid 1240"
sleep 1;
echo "delete ipf rule entry ruleid 1250"
sleep 1;
echo "delete ipf rule entry ruleid 1260"
sleep 1;
echo "delete ipf rule entry ruleid 1270"
sleep 1;
echo "delete ipf rule entry ruleid 1280"
sleep 1;
echo "delete ipf rule entry ruleid 1290"
sleep 1;
echo "delete ipf rule entry ruleid 1300"
sleep 1;
echo "delete ipf rule entry ruleid 1310"
sleep 1;
echo "delete ipf rule entry ruleid 1320"
sleep 1;
echo "delete ipf rule entry ruleid 1330"
sleep 1;
echo "delete ipf rule entry ruleid 1340"
sleep 1;
echo "delete ipf rule entry ruleid 1350"
sleep 1;

echo "exit"

} | telnet $router

fin


Just to give you an example, limitations are only set by your
phantasy for the idrules, Young Skywalker.

greets,

polonus

Hi Polonus,

Yes all my probes are blocked using the free Comodo Firewall Version 1.1.002. I am not including a screen shot but I had 18 systems ports scanned, results blocked or stealthed. Then another 8 ports that are commonly used by Trojans were scanned, results blocked or stealthed. Once again another scan of my ICMP, type 8 was scanned with results blocked, or stealthed.
So, my friend, along with a thorough and complete “Stealthed” test result from Steve Gibsons GRC test with using “Comodo Free F.W.” I am more than satisfied with the performance of Comodo as a new, viable and good operating firewall. The following quote from the Sygate test site stated this:
" You have blocked all of our probes! We still recommend running this test both with
and without Sygate Personal Firewall enabled… so turn it off and try the test again."
Thanks for the site Polonus, have a nice day. ;D
neal

I was stealthed with and without my comodo personal firewall. My linksys firewall works!