Some tools, such as hping, were designed to scan through firewalls to determine the program's rulesets.

Hping, which is freely available, sends packets to hosts behind your firewall and reports on the status of the responses it receives. Based on these responses, a hacker can determine which types of packets specific hosts may allow. With this information, the hacker may also determine which brand of firewall is in use.