Elite IP Stealer (Read Me)
Elite IP Stealer v1.o
-=-=-=-=-=-=-=-=-=-=-=-=-
Thankyou for downloading this Elite IP Stealer. First I can’t
guarentee that this file is virus free unless you downloaded it from
the www.oogle.net server. For more info on this prog or additional
help please visit http://www.oogle.net/ipsteal/
And of course, because this software was written by Oogle it was
made Virus/Virii/PWS/Deltree FREE!
ACK Tunneling Trojans
ACK Tunneling Trojans
– Arne Vidstrom, arne.vidstrom@ntsecurity.nu
Summary
Trojans normally use ordinary TCP or UDP communication between their client and server parts. Any firewall between the attacker and the victim that blocks incoming traffic will usually stop all trojans from working. ICMP tunneling has existed for quite some time now, but if you block ICMP in the firewall you’ll be safe from that. This paper describes another concept, that I call ACK Tunneling. ACK Tunneling works through firewalls that don’t apply their rule sets on TCP ACK segments (ordinary packet filters belong to this class of firewalls).
ACK Tunneling Trojans
ACK Tunneling Trojans
– Arne Vidstrom, arne.vidstrom@ntsecurity.nu
Summary
Trojans normally use ordinary TCP or UDP communication between their client and server parts. Any firewall between the attacker and the victim that blocks incoming traffic will usually stop all trojans from working. ICMP tunneling has existed for quite some time now, but if you block ICMP in the firewall you’ll be safe from that. This paper describes another concept, that I call ACK Tunneling. ACK Tunneling works through firewalls that don’t apply their rule sets on TCP ACK segments (ordinary packet filters belong to this class of firewalls).