Kali Linux

Findwall : Check If Your Provider Is Blocking You

FindWall is Python script that allows to understand if your network provider is limiting your access to the Internet by blocking any TCP/UDP port. In order to perform this check FindWall needs to connect a public VPS of your property. FindWall performs the following actions:

  • Connects to the VPS via SSH
  • Opens a port in listening mode
  • Tries to connect to that port from the local machine
  • Closes the port

How do you use it?

To use FindWall you just need an account on a public VPS. The account must have root access if you want to test ports in the range 1-1024. The root account is also required to automatically install the tool nc to open ports.

$ pip install -r requirements
$ python findwall.py –help
███████╗██╗███╗ ██╗██████╗ ██╗ ██╗ █████╗ ██╗ ██╗
██╔════╝██║████╗ ██║██╔══██╗██║ ██║██╔══██╗██║ ██║
█████╗ ██║██╔██╗ ██║██║ ██║██║ █╗ ██║███████║██║ ██║
██╔══╝ ██║██║╚██╗██║██║ ██║██║███╗██║██╔══██║██║ ██║
██║ ██║██║ ╚████║██████╔╝╚███╔███╔╝██║ ██║███████╗███████╗
╚═╝ ╚═╝╚═╝ ╚═══╝╚═════╝ ╚══╝╚══╝ ╚═╝ ╚═╝╚══════╝╚══════
usage: findwall.py [-h] –ssh-host SSH_HOST [–ssh-port SSH_PORT] –ssh-username SSH_USERNAME [–ssh-password SSH_PASSWORD] [–ask-ssh-pass] [–ssh-key SSH_KEY] –ports PORTS [–udp]
[–threads THREADS]
Check if someone is blocking you!
optional arguments:
-h, –help show this help message and exit
–ssh-host SSH_HOST Remote host
–ssh-port SSH_PORT Remote SSH port
–ssh-username SSH_USERNAME
Remote SSH username
–ssh-password SSH_PASSWORD
Remote SSH password
–ask-ssh-pass Ask for remote SSH password
–ssh-key SSH_KEY Remote SSH private key
–ports PORTS Port range to scan (default: 1-1024)
–udp Scan in UDP
–threads THREADS Number of threads (default: 1)

As an example:

$ python findwall.py –ssh-host 172.17.0.2 –ssh-port 22 –ssh-username test –ssh-password test –ports 8000-8010 –threads 3

R K

Recent Posts

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

2 hours ago

MODeflattener – Miasm’s OLLVM Deflattener

MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…

2 hours ago

My Awesome List : Tools And Their Functions

"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…

2 hours ago

Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…

2 hours ago

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…

2 hours ago

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…

5 hours ago