Unusual firewall bypassing techniques, network and computer security.

4974 776173 616C6C 76657279 77656C6C 746F 736179 604472696E6B 6D652C27 627574 746865 77697365 6C6974746C65 416C696365 776173 6E6F74 676F696E67 746F 646F 74686174 696E 61 68757272792E 604E6F2C 49276C6C 6C6F6F6B 66697273742C27 736865 736169642C 60616E64 736565 77686574686572 69742773 6D61726B6564 22706F69736F6E22 6F72 6E6F74273B 666F72 736865 686164 72656164 7365766572616C 6E696365 6C6974746C65 686973746F72696573 61626F7574 6368696C6472656E 77686F 686164 676F74 6275726E742C 616E64 656174656E 7570 6279 77696C64 626561737473 616E64 6F74686572 756E706C656173616E74 7468696E67732C 616C6C 62656361757365 74686579 776F756C64 6E6F

Lewis Carroll "Alice In Wonderland"
Chinese French Russian Spanish Polish Italian
Home | Projects | Papers | Forum | Team | Links | Contributions

Welcome on the GW team website dedicated to our main areas of interest and research which are the "Network Access Control Systems" bypassing techniques : Tunneling, Covert channels, Network related steganographic methods and so on.

Covert channels are simple yet very effective mechanisms that enable communication via unauthorized or not even thought of methods. They can pass over various access control, monitoring and reporting network systems as these systems usually fail to check the intrinsic value of data streams in transit.

Network Covert Channels are often based on the concept of Tunneling. This mechanism allows encapsulation of any protocol within another enabling thus authorized data streams to carry arbitrary data.

At present, we've developed some projects that allow to establish Covert Channels inside TCP (HTTP, HTTPS, MSN) and UDP protocols : Active Port Forwarder - SSL secure packet tunneling; CCTT - arbitrary TCP and UDP data transfers through TCP,UDP and HTTP POST messages; Firepass - arbitrary TCP and UDP data transfers through HTTP POST messages; MsnShell - remote Linux shell through the MSN protocol; Wsh - remote Unix/Win shell through HTTP and HTTPS protocols; Cooking channels - communication channel over HTTP cookies; g00gle CrewBots - communication channels over the g00Gle.

Read our papers related to Covert Channel techniques : creation, covering and detection of such kind data flows.

All of our programs/papers are released under the GNU General Public License (GPL) version 2.0 or under the GNU Free Documentation License, Version 1.2 (GFDL). They are meant to be used for educational/research purposes.

We also have other interesting links and papers, related to our favorite topic or to the main computer and network security research field. If you have any suggestion or comment, don't hesitate to drop few lines at our general discussion forum or to visit us on the Irc.

Along with NACS bypassing topics, we are also interested to team up or cooperate on other areas related to computer and network security.

If you find our work of interest or use, please do consider contributing.

Paper : Reverse Tunneling Techniques: theoretical requirements for the GW implementation.

Team member's sites:

GNU  GNU General Public License
 GNU Free Documentation License