Bugtraq mailing list archives

Sniffing Administrator's Password in Symantec Firewall/VPN Appliance V. 200R


From: Juan de la Fuente Costa <jfc () robota net>
Date: Tue, 22 Oct 2002 11:16:58 +0200

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Users inside corporate network (LAN) are able to sniff
administrator's
password by means of ARP poisoning.

To avoid this problem we tried to hardcode administrator's MAC
address
inside firewall's configuratiĆ³n;

But this was not the solution, as there was possible to perform the
attack under this scenario too.

Is there any way to stop this arp-poisoning attacks against the
firewall?
Our goal is to provide security not only for attacks comming from
Internet,
but also for attacks comming from corporate's internal network (LAN).

We already contacted Symantec's Support but we got no solution from
them.

======================================================================
==
Juan de la Fuente [jfc () robota net]
Robota Seguridad (http://www.robota.net)
Area de Consultoria.
Tl:913095106
- ----------------------------------------------------------------------
- --
PGP Key ID: 0X42EBD3A2
PGP Key available at: http://www.robota.net/pgp/jfc.asc
======================================================================
==

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.3 for non-commercial use <http://www.pgp.com>

iQA/AwUBPbUJNR3ZkSFC69OiEQJuOwCeNBmSpgYP4Ou+QA0JhNaudT1CYSkAn3Yd
5961yXGrS/neyxEuc/l+rq++
=2fP9
-----END PGP SIGNATURE-----



Current thread: