![]() Difficult to do with varying header length, and you'd have to check every single outgoing packet which would absolutely murder your router CPU. The only remaining option I can think of is to match the bits for a DNS query. On the other hand, if I'm ignorant on just how many apps of this type are out there, or the apps that are do not consistently use the same server IP/ports for their service then you're pretty well stuck. While you might not find/check every app out there, it shouldn't take too much effort to check the main options. If by chance they use either server IP or port consistently, you can block based on those. ![]() Captures will give you what server IP's they're using as well as ports. The best avenue, depending on how many "DNS cloak" apps are readily available, is to download them and use the service while running a WireShark packet capture.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |