Penetration Testing mailing list archives
pushing exploits through the Firewall
From: "Mike Gilligan" <mikewgilligan () hotmail com>
Date: Sun, 12 Feb 2006 16:42:16 +0800
Hi groupSay a pentester manages to discover a vulnerable version of BIND running on an external DNS server and has successfully sourced an exploit for the vuln. I'm curious how it would be possible to launch the exploit against the server when a packet filtering device and stateful inspection Firewall sit between the pentester and the vuln host. It would seem at first glance that this is not a viable option. How else might one go about exploiting the vuln?
Mike _________________________________________________________________Get MSN Hotmail alerts on your mobile. http://mobile.msn.com/ac.aspx?cid=uuhp_hotmail
------------------------------------------------------------------------------Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at:
http://www.securityfocus.com/sponsor/pen-test_050831 -------------------------------------------------------------------------------
Current thread:
- pushing exploits through the Firewall Mike Gilligan (Feb 12)
- RE: pushing exploits through the Firewall Enrique A. Sanchez Montellano (Feb 12)
- <Possible follow-ups>
- RE: pushing exploits through the Firewall c . ehlen (Feb 15)
- RE: pushing exploits through the Firewall Evans, Arian (Feb 15)