FPipe icon

FPipe

2 big stars
FPipe screenshot
Name: FPipe
Works on: windowsWindows 7 and above
Developer: Foundstone Inc
Version: 2.1
Last Updated: 25 Feb 2017
Release: 14 Sep 2009
Category: Network Tools > Misc. Networking Tools
Rate this software:
303 downloads
screenshotsView Screenshots(1)
commentsComments
downloadDownload
Liked it? Tell others:
details

FPipe Details

Works on: Windows 10 | Windows 8.1 | Windows 8 | Windows 7 | Windows 2012
SHA1 Hash: 01a43f871b51ad2fb633a3a84d9507e32aa2d60a
Size: 10.12 KB
File Format: zip
Rating: 2.608695652 out of 5 based on 23 user ratings
Downloads: 303
License: Free
FPipe is a free software by Foundstone Inc and works on Windows 10, Windows 8.1, Windows 8, Windows 7, Windows 2012.
You can download FPipe which is 10.12 KB in size and belongs to the software category Misc. Networking Tools.
FPipe was released on 2009-09-14 and last updated on our database on 2017-02-25 and is currently at version 2.1.
download button
Thank you for downloading from SoftPaz! Your download should start any moment now. It would be great if you could rate and share:
Rate this software:
Share in your network:
features

FPipe Description

The FPipe application was designed to be a source port forwarder / redirector. It can create a TCP or UDP stream with a source port of your choice. This is useful for getting past firewalls that allow traffic with source ports of say 23, to connect with internal servers.
Usually a client has a random, high numbered source port, which the firewallpicks off in its filter. However, the firewall might let Telnet traffic through. FPipe can force the stream to always use a specific source port, in this case the Telnet source port. By doing this, the firewall sees the stream as an allowed service and lets the stream through.
FPipe basically works by indirection. Start FPipe with a listening server port, a remote destination port (the port you are trying to reach inside the firewall) and the (optional) local source port number you want. When FPipe starts it will wait for a client to connect on its listening port. When a listening connection is made a new connection to the destination machine and port with the specified local source port will be made - creating the needed stream. When the full connection has been established, FPipe forwards all the data received on its inbound connection to the remote destination port beyond the firewall.
FPipe can run on the local host of the application that you are trying to use to get inside the firewall, or it can listen on a 3rd server somewhere else.
Say you want to telnet to an internal HTTP server that you just compromised with MDAC. A netcat shell is waiting on that HTTP server, but you cant telnet because the firewall blocks it off. Start FPipe with the destination of the netcat listener, a listening port and a source port that the firewall will let through. Telnet to FPipe and you will be forwarded to the NetCat shell. Telnet and FPipe can exist on the same server, or on different servers.

IMPORTANT:

Users should be aware of the fact that if they use the -s option to specify an outbound connection source port number and the outbound connection becomes closed, they MAY not be able to re-establish a connection to the remote machine (FPipe will claim that the address is already in use) until the TCP TIME_WAIT and CLOSE_WAIT periods have elapsed. This time period can range anywhere from 30 seconds to 4 minutes or more depending on which OS and version you are using. This timeout is a feature of the TCP protocol and is not a limitation of FPipe itself.
The reason this occurs is because FPipe tries to establish a new connection to the remote machine using the same local IP/port and remote IP/port combination as in the previous session and the new connection cannot be made until the TCP stack has decided that the previous connection has completely finished up.
screenshots

FPipe Screenshots

FPipe screenshot 1
similarSimilar Software