Author: <span class="vcard">victoria</span>

What is the Evasion Gateway?

The Evasion Gateway is a fully functional IP level gateway that utilises the unique capabilities of the Informer technology to enable bidirectional transmission of packets through stealth mode interfaces whilst applying a number of well known evasion techniques designed to evade and validate many of today network and security devices.

The Evasion Gateway has been designed to provide an easy to use, Microsoft Windows based network gateway capable of applying a number of the most common evasion techniques used in many of today’s host based vulnerability assessment tools enabling:

Bi-directional network based evasion

Apply evasion techniques to all packets transmitted from either the Internal or External interfaces or both.


User defined packet fragmentation levels between 8 and 1512 bytes in 8 bytes increments, Null fragment insertion before or after original packet, transmission of fragments out of sequence and an override for specific TCP packet types.

HTTP Evasion

The HTTP Evasion Settings enable the modification of URL’s as they pass through the gateway using any one of 15 techniques or combination of those techniques.

URI Encoding

URI encoding (non UTF8) (hex encoding)
Characters are converted to their hex equivalent so:

GET /documents/example.pdf becomes GET /%64%6f%63%75%6d%65%6e%74%73/%65%78%61%6d%70%6c%65%2e%70%64%66

Random URI encoding (non UTF8) (random hex encoding)

Random characters are converted to their hex equivalent so:

GET /documents/example.pdf becomes GET /d%6f%63um%65%6e%74s/%65%78%61m%70%6c%65%2e%70%64f

Why do I need to use these techniques? TCP/IP has rapidly become the predominant communications protocol used in a variety of applications including:

Security, Firewalls, Intrusion Detection/Prevention, Networking, Switches, Routers, Telephony, IP phones, GPRS, Internet Services, Web servers, News servers, eMail are all potential weak points in a network.  Sharpening a knife systems capability to detect these intrusions is critical.

Each one of these devices and others have many configuration scenarios that can lead to misuse or even circumvention of the device to allow unauthorized or undetected use.

There are a number of ways in which each of these devices can be validated using tools such as IDS and Firewall Informer, vulnerability scanners and so on.  The Evasion Gateway can augment those existing technologies to determine if a particular technique will enable an unauthorized user access to systems

So how does it work?

The following example describes the configuration of the Evasion Gateway when used to validate various characteristics of a web server.

This example can be used on multiple machines i.e.: one running the web client and the other the Evasion Gateway or on one machine i.e.: both the web client and the Evasion Gateway running simultaneously. This is possible as the Evasion Gateway creates virtual machines at the hardware and IP layers and can therefore communicate with local machine as packets are broadcast in a hub or forwarded on a switch through the same port.


This will require resetting the default gateway on the web client to the IP address of the internal interface of the Evasion Gateway

When a GET request is initiated from client the packets will be sent to the Evasion Gateway . As packets pass through the Evasion Gateway the selected evasion techniques will be applied and the modified packets sent onto the real default gateway which will then pass the modified packets onto the real default gateway which in turn will pass them onto the web server. If the plasma cutting technique is successful then the web page requested will be displayed.

This scenario can be used to augment existing network and application validation methodologies.

Additional uses include the validation of RFC compliance on the IP stack of the network device being tested. For instance “does the network device successfully reassemble fragmented fragments?” This can be validated by running multiple gateways in sequence fragmenting packets at different sizes.

Web Security

The need to apply perimeter access controls over corporate networks is an operational challenge that administrators face on a daily basis.  The problem of access control is compounded by multi-tiered security technologies that mandate daily change control processes and end-user coordination.

The operational cost of managing disparate security technologies and change control processes has introduced a significant barrier to regularly verifying the integrity of perimeter security defenses until now.

Firewall Informer is the only product in the market that empowers end-users to cost effectively measure their firewall security investment.

Security, network, auditing and consulting professionals now have the capability to easily test the system integrity and configuration of any production device that provides firewall capabilities in a safe, repeatable and controlled manner.

End-users can test both internal and external access of a firewall system in a daily basis to confirm and validate the types of network traffic that are allowed and blocked.  This can be accomplished through the knife software.

Firewall Informer allows the bi-directional verification of end user specified network traffic protocol, source and destination information.  Firewall Informer also enables reports to be generated by end-users to quickly identify any configuration or firewall system integrity issues.

How Does It Work?

Firewall Informer uses pre-defined network traffic to send packets between two network cards.  Where necessary the network traffic will contain a valid two-way conversation between two devices.  All information designated as the source is transmitted from the primary network card and targeted at the secondary network card. The secondary network card then listens for the inbound packet and responds accordingly. By connecting the network interface’s either side of a Firewall, a protocol scan matching the current installed policy can provide a 100% guarantee of operation.

Under normal circumstances connecting a single device into both sides of a firewall would constitute a significant risk and one that typically would not be allowed.  We negate that problem thanks to our ability to send and receive packets without the need for protocols to be bound to the cards. In order for us to maintain connectivity with the next hop gateway or switch we have built the necessary components of the Address Resolution Protocol (ARP) into our packet drivers.

This enables full spoofing of the source and destination IP addresses as well as the source and destination MAC addresses and when used in conjunction with the packet expiration option, can be used on production systems without the need for continuous reconfiguration of the IP stack for the source and without having to connect to the destination.  This insures consistent sharpness of the blade system.

How do you guarantee packet delivery?

When a packet is created, a number of unique identifiers are built into it that remains static throughout its transmission life-cycle regardless of any address translation the packet may have undergone. These unique identifiers enable the destination machine to interpret the packet or data stream accordingly, waiting for all the fragments to arrive, reordering the packets and acknowledging receipt where appropriate.

Firewall Informer looks for these unique identifiers at the destination and responds by either sending the next packet or by terminating the test and reporting a failure dependent on the expected result field in the particular rule or the transmission methods used.

Web Security

Advances in the types of disk storage available have significantly increased server speeds while decreasing latency.  So what types of storage hardware should you consider if you’re looking to upgrade your servers?

When considering upgrading their hardware many tech’s don’t know where to start.  Most would consider processing the most important part of the equation, but this isn’t always the case. They might dwell on possible expenditures, or time and inconvenience that features some jobs. Nevertheless, it does not need to be tough to enhance your house. With mindful planning and education, homeowners can quickly finish a job without any problems.

Solid state hard drives

When improving your home, there are some projects that you can do yourself and others that you can not. If you seem like you can finish an easy task like repainting the kitchen area, then by all means do it, in order to conserve yourself some extra money. Simply be sure that you know what you’re getting yourself into before you begin a job. You don’t want to try and redesign your bathroom and find out half method through that you’re not sure if you can complete the task without striking a pipeline.

If you do not like to nail photos to the wall because of the holes the nails make, a simple option is buying installing squares. Installing squares can quickly hold a couple of pounds and can be quickly eliminated without harming your wall. Stick four squares entirely, one in each corner of your frame to install your photo effectively on your wall.

Always do your due diligence when investing in new technology.  Ensure that it will be capable of handling the load you place on it as well as whether it is capable of handling the down-time expectations of your business.


One of the most efficient ways to increase storage capacity is to use off-site storage.  Bend Oregon Self Storage specializes in exactly that.  They have a wide variety of storage solutions available.

Do not ignore the addition of storage space to your new or existing home. Most homes are substantially lacking in storage area. Include built in bookshelves to the living-room or dining-room. Turn a broom storage room near the kitchen area into a food pantry. Small changes and additions will truly accumulate.

Set up a lazy Susan in those odd corner cabinets. It can be tough to correctly use the storage space they provide, if you need to come down on your hands and knees to search for the products in the back corners. A lazy Susan will certainly permit you to reach your products quickly whenever.

You can add storage to your spaces by simply recycling old shoe boxes. You can cover the shoe boxes with material or wallpaper samples for an intriguing decorating touch. It’s an extremely easy way to add additional storage along with beauty to your room.

Instead of buying plastic boxes for under bed storage, buy some square baskets. Baskets are an excellent method to shop products you may need throughout the day, while keeping your space uncluttered and cool. Plastic does not look really good, but making use of baskets can be a touch of professionalism in any environment.

In this article, you’ve checked out a variety of suggestions on how you can prepare yourself for home enhancement jobs. With numerous chances to inform oneself about the risks and possible issues connected with home enhancement projects, virtually anybody can do them.

Handy Tools

japanese knifeWith the advent of computer assisted design software even knife design is moving into the 21st century.  For thousands of years humans have crafted blades out of everything from stones to steel.  Much of this was done based on the look and feel of the blade.  Depending on the materials used, the shape of the blade needed to be very specific to ensure that it would last. Now CAD software allows for the design of knife blades in 3 dimensions before they’re ever forged.

Blade Software Delivers High Performance Blades

One of the most difficult things about knife making is knowing what shape to make the blade in order to take full advantage of the strength of the steel.  While many knives may look alike, the alloys that make up the blade are often very different from one another.

A perfect example of this is the difference between European or “Western” knives and Japanese or “Eastern” style knives.  Let’s take a quick look into the differences between the two.

Japanese knives rely upon extremely strong but often brittle steel.  The blades are very thin and often as sharp as a razor.  They are extremely useful for fast, accurate cutting.  However this high performance comes at the cost of durability.  Since the steel is so hard it sometimes chips or even cracks if used improperly.  For instance you wouldn’t want to use an extremely sharp Japanese chef’s knife to bone a chicken.  The dense bone materials could nick the blade.

And because the steel is so hard, they are difficult to repair.  You must also be relatively careful when handling these knives.  Even dropping it into the sink can cause the metal to crack.  But when used on the right types of foods, these knives allow a chef to move at incredible speeds.

Western knives on the other hand are made with comparably softer steel alloys.  The reason for this is mostly for durability.  While the angle of the blade isn’t as steep as a Japanese knife, they are still extremely sharp.  They also have the added flexibility of being able to cut a large variety of foods.  Even boning a chicken is fine with a German chef’s knife.

The Angle Is the Key

The bevel angle is the key to the puzzle.  Getting the angle just right so that the blade is durable yet still sharp requires testing.  Before software this had to be done by trial and error.  Now we can analyze the strength properties of the blade before it has even been forged.  We can see that small changes in the thickness along the length of the blade can have a significant impact on the life expectancy and performance of the knife.

For this reason it is important that a quality sharpener is used.   The best knife sharpener ( should have an adjustable angle selector.  This enables you to choose the angle at which you wish to sharpen the blade.  This ensures that the integrity of the blade is maintained as the bevel angle remains the same as the factory angle.

With advanced software tools we’re able to predetermine the exact bevel angle to accentuate the strength of the steel used in the blade.  Every small detail makes a difference.

Blade Design Software

Among the most in demand designs of residence decoration in the past few years is bohemian chic or ‘boho chic’. And while you can spend a great deal of money embellishing your home in this mingled style, there methods to remove the appearance you wish without investing a lot of cash.

How you can Save Hard earned cash While Searching for Decorations

One of the best methods to conserve hard earned cash AND ALSO at the same time make sure a natural design is to go with someone who can hand craft all of pieces you really want to include into your residence or area. Frequently if you dig around on various web sites that specialize in hand-crafted one of a kind items you can discover some quite excellent bargains.

If you are willing to acquire multiple things from these little producers they are additionally considerably more most likely to supply you a bulk rebate.. This is something that you will never obtain from a big chain store or chain.

An additional advantage of choosing a little manufacturer is that you can request a custom colour palate that will certainly mach the rest of your decoration specifically. While this isn’t consistently needed, especially in bohemian area decor, it can make fitting pieces in a lot easier.

Some Well-liked Designing Styles

Among one of the most trendy methods within the boho chic design is Shibori. This is an old Oriental technique of dying making use of indigo. Most people are more familiar with the term tie dye. It is essentially the exact same point. The cloth makers utilize ropes or rubber bands to tighten the textile prior to soaking it into a dye bath to produce fascinating patterns. While Shibori fabrics were generally produced making use of indigo, any color will do. It’s merely a matter of your personal taste.

You can locate any kind of variety of Shibori cushions as well as materials at internet sites like Natalie V Mason. This website concentrates on bohemian home decor and also their internet address is It’s a fantastic area to begin trying to find these kind of things.


Web Security

While many still enjoy the experience of going out to the malls and brick and mortar stores, the digital age has changed shopping forever for millions of people.  For those that don’t care for the long lines, the crazy crowds, and roaming parking lots for a half hour just to find a spot a mile from the stores, the idea of completing all of their Christmas shopping online is pure bliss.

Gourmet Paleo Cookies

Of course often you can find many of these same producers on their own websites.  Due to the mechanics of search engine rankings, it’s often difficult for these smaller sites to rank with the Amazon’s and Etsy’s of the world.  But if you look, you can find them.  And if you enjoy directly supporting smaller businesses, you can buy directly from them.  This way they avoid the commissions normally paid to the bigger sites.

The paleo cookies we mentioned earlier in the article are a perfect example. sells their paleo chocolate chip cookies through Amazon, but they also have their own small website where they sell their their products.  Either way you pay the same price, but ordering direct means more money for the small business.  You can find some of the best chocolate chip cookies here.

And sometimes, just sometimes, you can’t find what you’re looking for on any of the big shopping sites.  Or maybe there is some sort of difficulty with shipping.  In these rare cases, you might actually be forced to venture out into the jungle of the mall during the Holiday Season.  If this happens to you, you have our condolences.  For us, it’s online, or nothing at all.

The Biggest Retailer

While the biggest retailers in the world used to be Sears, Macy’s, Bloomingdale’s and even Walmart, for those looking to shop from the comfort and tranquility of their living rooms, is the king of them all.  With more items than Walmart, Amazon carries just about everything you could ever need.  From books and movies to food items such as paleo cookies, they literally have everything you could possibly want.

Amazon also features thousands of small privately owned shops hosted on their enormous e-commerce platform.  Say for instance that you’re looking for blue elephant pillows as a gift for your daughters dorm room.  You’ll find those on Amazon sold by a third party.  The ordering process is seamless. As far as you know, you’re ordering from Amazon themselves, but you’re actually supporting a small business somewhere.

Speaking of home decor, another great site that has made a niche for itself in the handmade craft market is  Here you can find anything from handmade decor to jewelry and even some food items.  The aforementioned handmade elephant pillows are something you can find on Etsy too.  And while sellers must pay a commission to whichever site they use, it’s often worth the time to compare as commission rates vary as well as the prices themselves.


Web Security