Tool and Usage
|Latest release||No release found|
How it works
FireAway uses a client-server connection. Typically the FireAway server is started on the outside of the firewall, like a system on the internet. The client tool then tries to connect outside (egress) to this server. By using several methods of obfuscation, it will try to deliver traffic to the server listening on the outside.
Usage and audience
FireAway is commonly used for bypassing firewall rules, firewall auditing, network traffic filtering, or penetration testing. Target users for this tool are network administrators, pentesters, and security professionals.
- Command line interface
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
- + The source code of this software is available
- - No releases on GitHub available
- - Unknown project license
Supported operating systems
FireAway is known to work on Linux.
Similar tools to FireAway:
The 0trace.py utility is a rewrite of 0trace (by another author) to perform reconnaissance and bypass network firewalls.
Opensvp is a security tool to test firewall software. It uses protocol level attacks to determine if the firewall is vulnerable to a type of attack.
Found an improvement? Help the community by submitting an update.
Related tool information
- Egress filtering
- This term is typically used within networking. It is monitoring and restricting information flows outbound from one network to another. Based on rules, packets are allowed or denied leaving the network segment.
This tool is categorized as a firewall testing tool.