EvasionLab Final1
EvasionLab Final1
Abstract
It is the aim of this report to trace a dynamic port forwarding through the SOCKS5 protocol and a VPN tunnel
as means of escaping firewall regulations and keeping a covert network connection. In comparison to
conventional port forwarding, which is comparatively evidently containing a difficulty to set up, the dynamic
port forwarding is stated for simplicity in configuring of TCP/IP ports exclusively. Consequently, this port
forwarding is obviously constrained as the port type is of protocol oriented, hence requires the enormous
attention in setting up of the system. On the other hand, VPN tunnelling can be set up in such a way that it can
provide a complete solution to such protocols and encryption and also with the help of dynamic routing one can
minimize latency. Nevertheless, VPN availability, monitoring, and customization make up for these issues but
the difficulty of installation along with the performance compromises has to be taken into account. The analysis
tries to contrast these tools using criteria e.g. traffic volume, the type of network, and the security needs they
would have, and thus gives network administrators a framework on which to make a choice of a suitable
firewall evasion method for their particular, individual networks.
SEED Labs – Firewall Evasion Lab NAT was set up on the router to
Report manage the traffic between these networks,
with specific iptables rules to facilitate and
With The Firewall Evasion Lab restrict traffic flow according to the lab
SEED Labs utilizes dedicated accessories requirements.
for deep consideration of the techniques
employed by the intruders aimed at Initial Setup:
bypassing the restrictive firewall policy
which in most cases blocks internet Network routes and initial firewall
services. The lab covers two critical rules were established to define the basic
concepts, namely VPN (Virtual Private operational parameters for the
Network) and port forwarding, SSH experiments.
tunnelling among them.
Objectives
Apprehending and installing VOIP
and port forwarding methods.
Education on the configuring and the
manipulating techniques of a network
traffic to surpass the protection limits of a
firewall.
Doing tasks like network set up and facing
up to the security evaluation risk with the
help of practical exercises.