Aren't you proud of me??

Discussion in 'other firewalls' started by NetTraveler, Nov 28, 2004.

Thread Status:
Not open for further replies.
  1. NetTraveler

    NetTraveler Registered Member

    Joined:
    Nov 16, 2004
    Posts:
    134
    Location:
    Amsterdam Netherlands
    :D I just run a GRC Shields Up Test.. Looks like I'm safe and sound.. Just like The Fort Knox.. :D :cool:
    C'mmon you hackers.. Catch me than if you can.... :D :D :cool:
    I'm not going to say what protection I'm using, but I can tell you one thing...
    Nothing fancy.. :D


    File Sharing Test;

    Attempting connection to your computer. . .
    Shields UP! is now attempting to contact the Hidden Internet Server within your PC

    Your Internet port 139 does not appear to exist!
    One or more ports on this system are operating in FULL STEALTH MODE! Standard Internet behavior requires port connection to be answered with a success or refusal response. Therefore, only an attempt to connect to a nonexistent computer results in no response of either kind. But YOUR computer has DELIBERATELY CHOSEN NOT TO RESPOND (that's very cool!) which represents advanced computer and port stealthing capabilities. A machine configured in this fashion is well hardened to Internet NetBIOS attack and intrusion.

    Unable to connect with NetBIOS to your computer.
    All attempts to get any information from your computer have FAILED. (This is very uncommon for a Windows networking-based PC.) Relative to vulnerabilities from Windows networking, this computer appears to be VERY SECURE since it is NOT exposing ANY of its internal NetBIOS networking protocol over the Internet.


    ----------------------------------------------------------------------
    Common Ports Test;

    Your system has achieved a perfect "TruStealth" rating. Not a single packet — solicited or otherwise — was received from your system as a result of our security probing tests. Your system ignored and refused to reply to repeated Pings (ICMP Echo Requests). From the standpoint of the passing probes of any hacker, this machine does not exist on the Internet. Some questionable personal security systems expose their users by attempting to "counter-probe the prober", thus revealing themselves. But your system wisely remained silent in every way. Very nice.


    GRC Port Authority Report created on UTC: 2004-11-28 at 11:57:17

    Results from scan of ports: 0, 21-23, 25, 79, 80, 110, 113,
    119, 135, 139, 143, 389, 443, 445,
    1002, 1024-1030, 1720, 5000

    0 Ports Open
    0 Ports Closed
    26 Ports Stealth
    ---------------------
    26 Ports Tested

    ALL PORTS tested were found to be: STEALTH.

    TruStealth: PASSED - ALL tested ports were STEALTH,
    - NO unsolicited packets were received,
    - NO Ping reply (ICMP Echo) was received.

    ----------------------------------------------------------------------
    All Service Ports Test;

    Determine the status of your
    system's first 1056 ports

    Your system has achieved a perfect "TruStealth" rating. Not a single packet — solicited or otherwise — was received from your system as a result of our security probing tests. Your system ignored and refused to reply to repeated Pings (ICMP Echo Requests). From the standpoint of the passing probes of any hacker, this machine does not exist on the Internet. Some questionable personal security systems expose their users by attempting to "counter-probe the prober", thus revealing themselves. But your system wisely remained silent in every way. Very nice.

    GRC Port Authority Report created on UTC: 2004-11-28 at 12:11:11

    Results from scan of ports: 0-1055

    0 Ports Open
    0 Ports Closed
    1056 Ports Stealth
    ---------------------
    1056 Ports Tested

    ALL PORTS tested were found to be: STEALTH.

    TruStealth: PASSED - ALL tested ports were STEALTH,
    - NO unsolicited packets were received,
    - NO Ping reply (ICMP Echo) was received.

    ----------------------------------------------------------------------


    Windows Messenger
    "Spam Yourself"
    Test Page
    Messenger Spam?

    I didn't get "Messenger Service" pop-up dialog boxes :)

    -----------------------------------------------------------------------
    Browser Headers Test;

    What is YOUR BROWSER disclosing
    about you and your system?

    Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/msword, application/x-shockwave-flash, */*
    Accept-Language: nl
    Connection: Keep-Alive
    Host: www.grc.com
    Referer: http://www.grc.com/x/ne.dll?rh1dkyd2
    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows...)
    Content-Length: 32
    Content-Type: application/x-www-form-urlencoded
    Accept-Encoding: gzip, deflate
    Cache-Control: no-cache
    Secure: https://www.grc.com
    Nonsecure: http://www.grc.com
    MediaPort: ****
     
  2. no13

    no13 Retired Major Resident Nutcase

    Joined:
    Sep 28, 2004
    Posts:
    1,327
    Location:
    Wouldn't YOU like to know?
    Good to see another user safe and sound.
    Code:
     Come on man...
     Just send me your Ip.... and I'll show you something.... c'mon... please?
     
    LOL.
    GRC tests are nice, except that that they are really basic and according to www.grcsucks.com , they're NOT reliable at all. I think they're cool though.
     
    Last edited: Nov 28, 2004
  3. TF6 user

    TF6 user Guest

  4. NetTraveler

    NetTraveler Registered Member

    Joined:
    Nov 16, 2004
    Posts:
    134
    Location:
    Amsterdam Netherlands
    :D I did it once.. :eek: And guy who tried to get into my system, got warning from my ISP LOL.
    He was a mod on one of forums I was joining, and a good friend of mine. So I asked him to look if he could see my desktop.. Promissing young "hacker" got scared sh*tless after that warning, and reassured me he'll never do it again... :D :D
    See? I was young and stupid once too.. :D
    That was exactly the reason for starting the thread Security for dummies..
    Most of people on Internet know nothing about security.. Than you find somebody who seem to know everything, and follow him like lost puppy.. I must admit I found and learned lot of interesting stuff thanks to Steve..
    I even think I found Wilders Security from one of the links on his page.. I'm not sure.. It was long ago..
    Anyway.. Mr. Eckenfels himself thought that Steve did some good things for
    net surfers..
    I enjoyed the reading on grcsucks tho.. :) Thanx..
     
  5. NetTraveler

    NetTraveler Registered Member

    Joined:
    Nov 16, 2004
    Posts:
    134
    Location:
    Amsterdam Netherlands
    Thanx TF6.. :) I'm sure going to try this one.. ;) :D
     
  6. jxkruzzn

    jxkruzzn Guest

    i also went thru all that one day, the next day I booted up to find I had a keylogger and a smalldropper trojan, haven't trusted those tests since!

    Glad it worked for you thogh,
     
  7. Kye-U

    Kye-U Security Expert

    Joined:
    Jun 11, 2004
    Posts:
    481
    NetTraveller,

    If you want more secure (if you're paranoid like me), then use a proxy program like Tor and surf around all of the internet with a fake IP. (I use it as a Socks 5 proxy on MSN, AIM, ICQ, and Y!)

    If you want to go even further (for those uber paranoid people like me :D) then use Proxomitron with Jakx's Spoofing Pack. You'd be surfing with 3 fake IP Addresses!

    ;)

    BTW, I get a perfect score on GRC with my Router disabled, so I feel pretty secure, but as the old saying goes, Where there's a will, there's a way.
     
  8. no13

    no13 Retired Major Resident Nutcase

    Joined:
    Sep 28, 2004
    Posts:
    1,327
    Location:
    Wouldn't YOU like to know?
  9. Kye-U

    Kye-U Security Expert

    Joined:
    Jun 11, 2004
    Posts:
    481
    ^_^

    I agree ;) It takes a bit to get used to at first, like 6 months - 1 year, but once you get it, the web is in your palm(s) =D
     
  10. gkweb

    gkweb Expert Firewall Tester

    Joined:
    Aug 29, 2003
    Posts:
    1,932
    Location:
    FRANCE, Rouen (76)
    Hi,

    you weren't clear about which sites you talked about, but if it was about firewallleaktester, there is NO malware on it, please read this page :
    http://www.firewallleaktester.com/lktvirus.htm

    Regards,

    gkweb.
     
  11. no13

    no13 Retired Major Resident Nutcase

    Joined:
    Sep 28, 2004
    Posts:
    1,327
    Location:
    Wouldn't YOU like to know?
    i think what he meant was that there was backdoor type malware operational on his PC, but GEC's tests couldn't see the ports these malware had opened to listen for remote commands.
    regards.
    no13.
     
  12. TF6user

    TF6user Guest


    Nice site gkweb. I like using it to check my settings in TF6. Keep up the good work.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.