Penetration Testing mailing list archives
Re: [PEN-TEST] Firewalking
From: Ivan Buetler <ivan.buetler () CSNC CH>
Date: Wed, 7 Mar 2001 08:10:07 +0100
Pepijn, application level firealls will handle your request. you might connect to an ip adress within the dmz, but talking to the firewall. i recognized this behaviour for pix firewall or raptor. try nmap -sO in nmap 2.54 to identify supported protocols search for banners you haven't seen before in search engines. mostly one of the open ports gives you information about firewalls regards Ivan -----Original Message----- From: Penetration Testers [mailto:PEN-TEST () SECURITYFOCUS COM]On Behalf Of Pepijn Vissers Sent: Tuesday, March 06, 2001 10:26 AM To: PEN-TEST () SECURITYFOCUS COM Subject: [PEN-TEST] Firewalking Hi all, What would be the best way to determine what kind of firewall is running on a server? Especially one that does not give out any banners. TCP-fingerprinting is not possible because there are no obvious open ports. Any comments on this would be welcome, --- Pepijn Vissers
Current thread:
- [PEN-TEST] Firewalking Pepijn Vissers (Mar 06)
- Re: [PEN-TEST] Firewalking Tom Vandepoel (Mar 06)
- Re: [PEN-TEST] Firewalking Enno Rey (Mar 06)
- Re: [PEN-TEST] Firewalking Alberto Román (Mar 07)
- Re: [PEN-TEST] Firewalking honoriak (Mar 06)
- Re: [PEN-TEST] Firewalking Ivan Buetler (Mar 07)
- Re: [PEN-TEST] Firewalking Jan Muenther (Mar 07)
- [PEN-TEST] RES: [PEN-TEST] Firewalking Cristiano Lincoln Mattos (Mar 07)
- <Possible follow-ups>
- Re: [PEN-TEST] Firewalking Woch, Wojciech (Mar 08)