LEAKTEST
  > CATEGORIES
  LEAK TESTING
  KILL TESTING
  ADVICES
  DOCUMENTS
  REWARDS
  > IN THE WILD
  > LINKS
  > FAQ
  > TOOLS

     SCAN YOUR COMPUTER

     TEST YOUR BROWSER



Leaktest information
Website : http://grc.com/lt/leaktest.htm
Author : Steve Gibson (Gibson Research Corporation)
Dates : (first release -> end 2000) current version -> 07/11/2005
Categories : substitution
Download : leaktest1.2.exe (View EULA)
MD5 206C0533CE9BF83ECDF904BEC2F3532D
SHA-160 EF41DB76B1F0252BF3B10EDE0F7BED58F072884F
Operating System : Windows 9x/Millenium/NT4/2000/XP


Leaktest description
Due to the fact that some firewall trust only the trust that user gives to his application, it was demonstrated that the fact of just rename a malicious program with the name of an authorized application could allow it to bypass firewall.
Lastest version of personal firewalls includes a checksum check of application and warns user when this figerprint is modified.


Meaning
If the test is a success, this means that your firewall trust to your application by there name (characters) instead of by a crypted fingerprint, for instance an md5 one.

Download 'Leaktest' Leaktest
(View EULA)

Home      News      Contact      Online form      Mailing list