WinpkFilter sample in Visual Basic 6.0

Home Forums Discussions Support Portal WinpkFilter sample in Visual Basic 6.0

This topic contains 3 replies, has 2 voices, and was last updated by  Vadim Smirnov 9 years, 1 month ago.

Viewing 4 posts - 1 through 4 (of 4 total)
  • Author
    Posts
  • #5203

    fadsoftwares
    Participant

    Hi!

    Sorry my english! I’m brazilian!

    I need a WinpkFilter sample in Visual Basic 6.0 to to inspect and allow/drop packets. Where I can get it?
    It’s to filter URLs! To block or to allow a weblist.

    #6615

    Vadim Smirnov
    Moderator

    Among VB samples in WinpkFilter package you can find PassThru. This is basic sample to filter (drop, pass, modify) the network packets.

    #6616

    fadsoftwares
    Participant

    I’ve tested it.

    But i can’t get what is the site. Could you send me a sample how to do this?

    And the wwwcensor.exe doesn’t works in my computer to block a url. It doens’t stop the navigate.

    #6617

    Vadim Smirnov
    Moderator

    And the wwwcensor.exe doesn’t works in my computer to block a url. It doens’t stop the navigate.

    It worked fine for me and not only for me. Do other samples work fine on your system? How do you actually use use it?

    Could you send me a sample how to do this?

    wwwcensor demonstrates URL/content filtering for HTTP protocol. It blocks any HTTP packets containing the command line specified keyword. An example, to block access to yahoo.com it should be used as below:

    D:…dsntkvpnsamplesMSVCbinamd64>wwwcensor.exe
    Command line syntax:
    wwwcensor.exe pattern
    pattern – phrase or word to block HTTP packets with.

    D:…dsntkvpnsamplesMSVCbinamd64>wwwcensor.exe yahoo
    TCP 192.168.1.179:29627 -> 87.248.113.14:80 pattern found & packet dropped
    TCP 192.168.1.179:29627 -> 87.248.113.14:80 pattern found & packet dropped
    TCP 192.168.1.179:29627 -> 87.248.113.14:80 pattern found & packet dropped
    TCP 192.168.1.179:29627 -> 87.248.113.14:80 pattern found & packet dropped

    Note, that it also blocks any packet containing “yahoo” word, not only packets to/from yahoo.com.

    If ONLY URL filtering is required then you have two options:
    1) Block DNS requests for the forbidden sites (this does not allow your system to figure out the IP address and access the site).
    2) Parse HTTP packets for GET request and block packet if it requests the forbidden URL.

Viewing 4 posts - 1 through 4 (of 4 total)

You must be logged in to reply to this topic.