Gigabit Ethernet NIC Hardware Implant FIREWALK

As we all know the NSA has many different tools that they use to spy on us. Today I will be writing about FIREWALK, which is a Gigabit Ethernet NIC hardware implant.


What It Is
FIREWALK is a 10/100/1000bT (Gigabit) Ethernet network implant that is capable of passively collecting network traffic and actively injecting packets onto the same target network. FIREWALK resides within a dual stacked RJ45/USB connector. It is able to collect network traffic and send it to a ROC (or an intermediate redirector node) by creating a VPN tunnel between the target network and the ROC. FIREWALK also includes a RF interface for communicating with HOWLERMONKEY compatible based ANT products, filtering, and egressing network traffic.


What We Can Do
With hardware implants like this one there is not much that we can do. The only way to tell that your system has an implant like this one is to have it carefully analyzed which (depending on who you take it to) can cost a lot of money. The only advice that I have to give is to monitor network traffic from your main gateway or routers point of view. If you see any suspicious network traffic then maybe dig a bit deeper but otherwise I would not worry about this type of implant unless you are actually targeted by the NSA.


Thank you all for taking the time to read this post and as always God bless!

The NSA’s original documentation on FIREWALK


The following two tabs change content below.
Preston Hood
Hello, my name is Preston Hood. I am the owner of PJHoodsCo, an Information Technology Service Provider (ITSP). I am also a freelance writer and information security researcher.
Preston Hood

Latest posts by Preston Hood (see all)

Categories: Information Technology, IT Security, and Preston Hood.

Leave a Reply

Your email address will not be published. Required fields are marked *


You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>