Protecting your network from Internet intruders is of the utmost importance. Don’t rely solely on that fancy firewall software or hardware package to protect your network from malicious attacks just yet. Double-check your security measures by using the Firewall Leakage Tester (a.k.a., LeakTest). In this article, I’ll show you how to use this invaluable tool.
What is the Firewall Leakage Tester?
If you’re wondering what the Firewall Leakage Tester does, the name says it all. This application was designed from the ground up to do nothing but test for security leaks in some of today’s most popular software and hardware firewall applications.
Currently at version 1.0, the Firewall Leakage Tester is a freeware application, which you can download here. It has already discovered major flaws in many popular software firewall applications available on the market. It does this by taking a different approach to how firewall applications protect a network.
What’s the concept behind the application?
Most firewall applications, both hardware and software, block incoming traffic by preventing attackers from accessing a network via open access points, such as Telnet or FTP ports. However, if an application such as a Trojan horse, were to make it into your system, it might be able to send a signal outside of the network, allowing hackers access via a back door that it creates.
The Firewall Leakage Tester tries to trick these firewall applications by acting as a Trojan horse, transmitting a signal over the Internet to a server outside of the network. It then operates as a receiver to intercept the return message. If the message from the external network is received by the application, your firewall software/hardware has a leak.
How does the Firewall Leakage Tester work?
After downloading the zipped application from the Gibson Research Corporation’s Web site, you can install the software onto any Windows machine that has an Internet connection. The executable file must be renamed to represent a Trojan horse application or another application that would normally be blocked on a well-configured firewall. The LeakTest Web site suggests using the name vampire, which we’ve used in Figure A.
|Rename the Firewall Leakage Tester file to vampire or another name suggested on the LeakTest Web site.|
After you rename the file, double-click on the application to open it. The Firewall Leakage Tester dialog box shown in Figure B will appear. Click Test For Leaks, and the Ready to Test message will change to Connecting, as shown in Figure C. This indicates that the Firewall Leakage Tester application is looking for leaks in your firewall by trying to connect to your server.
|Double-clicking on the Firewall Leakage Tester application will bring up this dialog box.|
|This dialog box indicates that Firewall Leakage Tester is trying to detect leaks.|
If your firewall works properly, you’ll see an image such as the one shown in Figure D. Note that Unable to connect appears in bold, red type to let you know that the firewall worked properly. If a firewall fails, a similar message will appear explaining that the software was able to connect.
|Good news: Firewall Leakage Tester couldn’t connect to your network.|
Just because your network has a software and/or hardware firewall incorporated into the infrastructure doesn’t necessarily mean that the network is secure from hackers. The creator of the Firewall Leakage Tester built the program to prove that point.
By using the Firewall Leakage Tester to test the security of your network, you may discover that the systems you once believed to be hacker-proof are actually vulnerable. This will allow you to take the steps necessary to correct any holes that may be open to malicious individuals who could damage your systems.
Have you tried the LeakTest?
Have you used this program and discovered a hole in your firewall security? If so, we’d love to hear your story. Feel free to leave a post below or send us a note with your thoughts on this valuable little program.