Penetration Testing mailing list archives
Re: Exploit through firewall question
From: "R. DuFresne" <dufresne () sysinfo com>
Date: Thu, 20 Jul 2006 20:22:01 -0400 (EDT)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Wed, 19 Jul 2006, mr.nasty () ix netcom com wrote:
Thanks for the responses. You've confirmed what I had passed to mgmt. But I still have a problem (with mgmt) understanding why?... I perform vulnerability analysis on our outside (public) web presense, usually during development and then after it's been deployed. I basically use the same tools for each. Mgmt wants me to only test through the firewall as if I'm coming in like the public. The rational is that the fw will prevent any attacks though ports other than 80 and 443. Therefore, there is no reason to change this configuration. What would be the reason to test behind the firewall?
that there are other vulnerable systems or servers running on the same subnet, or that web based applications are vulnerable to attack. Prot 80 and 443 are not just plain safe in and of themselves. Especially with everything thazt tunnels over those ports these days.
Thanks, Ron DuFresne- -- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
admin & senior security consultant: sysinfo.com http://sysinfo.com Key fingerprint = 9401 4B13 B918 164C 647A E838 B2DF AFCC 94B0 6629 ...We waste time looking for the perfect lover instead of creating the perfect love. -Tom Robbins <Still Life With Woodpecker> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFEwB4sst+vzJSwZikRAqMKAKDI6qsDHrwwMnJRz7K4t2/ytyFXqQCghZoz wP9ee8rCgN8EDGQADSyH1+Y= =2yUA -----END PGP SIGNATURE----- ------------------------------------------------------------------------------ This List Sponsored by: CenzicConcerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------
Current thread:
- Re: Exploit through firewall question, (continued)
- Re: Exploit through firewall question mr . nasty (Jul 19)
- Re: Exploit through firewall question jm (Jul 19)
- Re: Exploit through firewall question Neil (Jul 19)
- Re: Exploit through firewall question Allen Pomeroy (Jul 19)
- Re: Exploit through firewall question Gary E. Miller (Jul 19)
- Re: Exploit through firewall question Larry Offley (Jul 19)
- Re: Exploit through firewall question Curt Purdy (Jul 19)
- Re: Exploit through firewall question Phil Frederick (Jul 19)
- Re: Exploit through firewall question killy (Jul 19)
- RE: Exploit through firewall question lists (Jul 19)
- Re: Exploit through firewall question R. DuFresne (Jul 20)
- RE: Exploit through firewall question salexander (Jul 19)
- RE: Exploit through firewall question Bob.Maggard (Jul 19)
- RE: Exploit through firewall question Moonen, Ralph (Jul 19)
- Re: Re: Exploit through firewall question bradcausey (Jul 19)
- Re: Exploit through firewall question mr . nasty (Jul 19)