Jump to content

GRC's Firewall LeakTeset

Recommended Posts

I needed to use Shield's Up, so went over to Steve Gibson's GRC services. https://www.grc.com/lt/leaktest.htm 
Results said firewall security didn't prevent the test. I wanted to get some feedback on how ESET's firewall should handle this test. Should it be stopped? What about with changing the built in settings?

Link to comment
Share on other sites


LeakTest is a safe and small (27k bytes), completely benign "chameleon utility" which can be used to simulate the presence and effect of Trojan horses, viruses, and adware/spyware running in your computer. It simply and quickly tells you whether it has been able to slip out past your firewall's outbound Trojan/Virus/Spyware protections and establish a standard TCP connection with our NanoProbe server.

To begin, this test would be used to test your existing outbound network traffic firewall rules. In default configuration, the Eset firewall allows all outbound network traffic conditioned upon the type of firewall profile being used.

If you set the Eset firewall to Interactive mode, it will detect this .exe attempting to perform an outbound connection. On the other hand in Interactive mode, all outbound network traffic legit or otherwise will also be detected and alert generated unless a previous firewall rule has been created to allow the outbound traffic.

Link to comment
Share on other sites

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Create New...