Penetration Testing mailing list archives

RE: [PEN-TEST] Detecting the presence of a firewall


From: Frank Knobbe <FKnobbe () KnobbeITS com>
Date: Mon, 14 May 2001 18:36:15 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

-----Original Message-----
From: railwayclubposse () hushmail com
[mailto:railwayclubposse () hushmail com]
Sent: Monday, May 14, 2001 11:44 AM

For Checkpoint, use nmap and do a TCP and OS detection scan. 
If they are 
doing one-to-many NAT the machines will be detected as 
"behind a Checkpoint 
Firewall-1 4.1 SP2 Server" or whatever. The firewall itself 
is likely to 
have some combination of  TCP ports 256-259, 264-265 open for 
management,
auth, key exchange, etc. 

What criteria is nMap using? What would the result be if a) the
well-known-Checkpoint-ports are closed, and b) the default TTL has
been monkied with? (Not you, Doug)

Regards,
Frank

-----BEGIN PGP SIGNATURE-----
Version: PGP Personal Privacy 6.5.8
Comment: PGP or S/MIME encrypted email preferred.

iQA/AwUBOwBr75ytSsEygtEFEQIE4wCg+fYkOVgnUUKAJln7YbQYeNM4qzcAoM2u
8LKpwZ4q3fUbsdkz/YFxbDel
=3TZs
-----END PGP SIGNATURE-----


Current thread: