Tools no image

Published on December 26th, 2013 | by NJ Ouchn


Firebind Reflector v0.99 released – Enumerate firewall rules made easy !

Firebind is now offering a public instance of its path scanning solution, Firebind Reflector.

Using one of three client options (Java applet, Java command line, Ruby command line) users can specify one or more TCP/UDP ports.  The client will then send traffic over every specified port to Reflector in order to determine which ports are blocked (by firewalls, ACLs, etc.) and which are not.

Firebind’s technology is the only path scanner that can profile the status of any TCP or UDP point along a network path between while also categorizing blocked ports into 1 of 8 different blocked/filtered categories.
Use Firebind Reflector to enumerate firewall rules by scanning the entire 1-64k TCP and UDP ranges.  With 2 command line client options, scans can be scripted with ease.  Reflector’s RESTful API (JSON, XML, CSV) provides an easy path to export scan results to third-party applications.

Submitted by Dave Patterson (Tool’s author)


Tags: , , ,

About the Author

Principal Founder & Maintainer - Freelancer ICS/SCADA Security Expert As part of my research, I'm focusing into maintaining many projects as the DPE (Default Password Enumeration), vFeed® the open source correlated & cross-linked vulnerability database and FireCAT the Firefox Catalog of Auditing exTensions. Today, I'm the co-organizer of the major event Blackhat Arsenal Tools (US and Europe) since 2011 and since 2014 co-organizer of Rooted Warfare in Spain. I'm going by the handle of @toolswatch on Twitter and always willing to help, share and drink with friends from far and wide.

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to Top ↑