- Joined
- Mar 5, 2002
- Messages
- 25,764
- Reaction score
- 1,218
Recently we, here at PC Flank, have released the Stealth Test that gives opportunity to determine if your firewall is successful in making your computer "stealthed". The "stealthed" system is invisible to others on the Internet, so it is harder for intruders to "detect" such system and thus far harder to attack. Indeed, "stealthed" system is not absolutely safe system, and we should not overrate it, but it is the first barrier made by firewall to stop intruders and it is better if this barrier works.
The Stealth test uses five scanning techniques: TCP ping, TCP NULL scanning, TCP FIN scanning, TCP XMAS scanning and UDP scanning. Using each technique the test creates a packet and sends it to port number 1 of your system. If your firewall drops the packet and does not send any response it will mean that your computer is "stealthed". Otherwise if there is any response from your system it will mean that your computer is "non-stealthed" and your firewall has failed this test.
Here is the descriptions of each packet:
We have selected and downloaded eight leading pesonal firewalls for our test. Each firewall was tested with default settings.
... and the results are ...
Why not discuss this on the forum?
The Stealth test uses five scanning techniques: TCP ping, TCP NULL scanning, TCP FIN scanning, TCP XMAS scanning and UDP scanning. Using each technique the test creates a packet and sends it to port number 1 of your system. If your firewall drops the packet and does not send any response it will mean that your computer is "stealthed". Otherwise if there is any response from your system it will mean that your computer is "non-stealthed" and your firewall has failed this test.
Here is the descriptions of each packet:
- TCP ping packet
Description: An uniquely configured TCP packet with the ACK flag - TCP NULL packet
Description: An uniquely configured TCP packet that contain a sequence number but no flags - TCP FIN packet
Description: The TCP FIN scanning is able to pass undetected through most personal firewalls, packet filters, and scan detection programs. The scan utilizes TCP packet with the FIN flag - TCP XMAS packet
Description: The TCP packet with the URG, PUSH(PSH) and FIN flags - UDP packet
Description: An uniquely configured UDP packet with empty datagram.
We have selected and downloaded eight leading pesonal firewalls for our test. Each firewall was tested with default settings.
... and the results are ...
Why not discuss this on the forum?